US11456820B2 - Method and apparatus for wireless communications with unequal error protection - Google Patents

Method and apparatus for wireless communications with unequal error protection Download PDF

Info

Publication number
US11456820B2
US11456820B2 US17/089,101 US202017089101A US11456820B2 US 11456820 B2 US11456820 B2 US 11456820B2 US 202017089101 A US202017089101 A US 202017089101A US 11456820 B2 US11456820 B2 US 11456820B2
Authority
US
United States
Prior art keywords
fec
mapper
error protection
protection level
bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US17/089,101
Other versions
US20210119734A1 (en
Inventor
Zeina Mheich
Lei Wen
Pei XIAO
Amine Maaref
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of US20210119734A1 publication Critical patent/US20210119734A1/en
Assigned to HUAWEI TECHNOLOGIES CO., LTD. reassignment HUAWEI TECHNOLOGIES CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MHEICH, ZEINA, WEN, Lei, XIAO, Pei, MAAREF, AMINE
Application granted granted Critical
Publication of US11456820B2 publication Critical patent/US11456820B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0061Error detection codes
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/25Error detection or forward error correction by signal space coding, i.e. adding redundancy in the signal constellation, e.g. Trellis Coded Modulation [TCM]
    • H03M13/255Error detection or forward error correction by signal space coding, i.e. adding redundancy in the signal constellation, e.g. Trellis Coded Modulation [TCM] with Low Density Parity Check [LDPC] codes
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/03Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
    • H03M13/05Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
    • H03M13/11Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits using multiple parity bits
    • H03M13/1102Codes on graphs and decoding on graphs, e.g. low-density parity check [LDPC] codes
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/27Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes using interleaving techniques
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/35Unequal or adaptive error protection, e.g. by providing a different level of protection according to significance of source information or by adapting the coding according to the change of transmission channel characteristics
    • H03M13/356Unequal error protection [UEP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0041Arrangements at the transmitter end
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0057Block codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0057Block codes
    • H04L1/0058Block-coded modulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/007Unequal error protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/32Carrier systems characterised by combinations of two or more of the types covered by groups H04L27/02, H04L27/10, H04L27/18 or H04L27/26
    • H04L27/34Amplitude- and phase-modulated carrier systems, e.g. quadrature-amplitude modulated carrier systems
    • H04L27/3405Modifications of the signal space to increase the efficiency of transmission, e.g. reduction of the bit error rate, bandwidth, or average power
    • H04L27/3416Modifications of the signal space to increase the efficiency of transmission, e.g. reduction of the bit error rate, bandwidth, or average power in which the information is carried by both the individual signal points and the subset to which the individual points belong, e.g. using coset coding, lattice coding, or related schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/32Carrier systems characterised by combinations of two or more of the types covered by groups H04L27/02, H04L27/10, H04L27/18 or H04L27/26
    • H04L27/34Amplitude- and phase-modulated carrier systems, e.g. quadrature-amplitude modulated carrier systems
    • H04L27/36Modulator circuits; Transmitter circuits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0071Use of interleaving

Definitions

  • the present disclosure relates generally to wireless communications and, in some particular embodiments, to methods and systems for multiple access (MA) communications.
  • MA multiple access
  • Multiple access is a function of wireless communications systems in which multiple user equipments can share resources. Multiple access systems may be orthogonal or non-orthogonal. In orthogonal multiple access systems, such as time division multiple access (TDMA), frequency division multiple access (FDMA), and orthogonal frequency division multiple access (OFDMA), signals for different users are transmitted on different physical channel resources (e.g., time, frequency, or some combination).
  • TDMA time division multiple access
  • FDMA frequency division multiple access
  • OFDMA orthogonal frequency division multiple access
  • NoMA non-orthogonal multiple access
  • CDMA code division multiple access
  • IDMA interleave division multiple access
  • IGMA interleave grid multiple access
  • MUSA multi-user shared access
  • LDS low density signature
  • SCMA sparse code multiple access
  • a device obtains a forward error correction (FEC) encoded bit stream.
  • the device maps the FEC encoded bit stream to produce a set of symbols according to a bit-to-symbol mapping rule.
  • the bit-to-symbol mapping rule comprises a first mapper bit position associated with a first mapper error protection level and a second mapper bit position associated with a second mapper error protection level.
  • the first mapper error protection level is greater than the second mapper error protection level.
  • the device then transmits the set of symbols in the communications system.
  • Apparatuses, devices, as well as non-transitory computer-readable mediums and computer program products, for performing the methods are also provided.
  • FIG. 1 is a diagram of an embodiment wireless communications network
  • FIG. 2 is a diagram of an embodiment transmitter for transmitting a signal in the wireless communications network
  • FIG. 3 is a constellation diagram of an example QPSK modulator
  • FIG. 4 is a schematic diagram of an example symbol-to-RE mapping operation
  • FIG. 5 illustrates an example UEP codebook or constellation with two protection levels and sixteen codewords
  • FIG. 6 illustrates an example one-dimensional UEP codebook (i.e., constellation) which provides UEP symbols
  • FIG. 7 illustrates example partitioning for one codebook dimension with two protection levels
  • FIG. 8 shows an example LDPC code with variable nodes of the degrees of three and one
  • FIG. 9 illustrates an embodiment interleaver between a LDPC encoder and an SCMA mapper, according to one embodiment
  • FIG. 10 shows a codeword form in the TS38.212 standard
  • FIG. 11A shows an example codeword before interleaving
  • FIG. 11B shows an example bit sequence after interleaving
  • FIG. 12 shows the average error rate for 20 and 100 LDPC decoding iterations for a code rate 1 ⁇ 3 when the frame length is 132 bits;
  • FIG. 13 shows the average error rate for 20 LDPC decoding iterations for a code rate 1 ⁇ 3 when the frame length is 1320 bits;
  • FIG. 14 shows the average error rate in the downlink Rayleigh fading channel for a code rate 1 ⁇ 3 when the frame length is 132 bits;
  • FIG. 15 shows the average error rate in the downlink Rayleigh fading channel for a code rate 2 ⁇ 5 when the frame length is 550 bits;
  • FIG. 16 shows the average error rate in the downlink Rayleigh fading channel for a code rate 1 ⁇ 2 when the frame length is 440 bits;
  • FIG. 17 shows an example LDS system with a constellation mapper, according to some embodiments.
  • FIG. 18 shows an example power-domain NoMA system with no spreading, according to some embodiments.
  • FIG. 19A illustrates a flowchart of method for data communications by a transmitting device in a communications system, according to some embodiments
  • FIG. 19B illustrates a flowchart of method for data communications by a receiving device in a communications system, according to some embodiments
  • FIG. 20 is a block diagram of an embodiment processing system for performing methods described herein.
  • FIG. 21 is a block diagram of a transceiver adapted to transmit and receive signaling over a telecommunications network according to example embodiments described herein.
  • NoMA improves the spectral efficiency of wireless radio access by enabling overloading (i.e., the number of multiplexed users can be larger than the number of resources).
  • Main categories of NoMA techniques are code domain NoMA (e.g., SCMA and LDS) and power domain NoMA (PD-NoMA).
  • Power domain NoMA schemes achieve multiple access by allocating different power levels to different users.
  • the receiver may use successive interference cancellation to perform multi-user detection.
  • Code domain NoMA schemes employ the concept of a multiple access code or signature that is specific to a user or a data stream.
  • the multiple access code or signature modifies the transmitted data such that the transmitted data can be discriminated at a decoder.
  • LDS is a code-domain NoMA technique where bits are mapped to a complex symbol according to a one-dimensional constellation, and the complex symbol is expanded to a sequence of complex symbols by using a specific spreading signature.
  • SCMA is also a code-domain NoMA technique and may be considered a generalization of LDS.
  • the bit-to-symbol mapping and code/signature-specific spreading are combined together such that bits are directly mapped to multi-dimensional sparse codewords selected from user-specific SCMA codebooks.
  • a “codebook” is a set of user-specific codes/signatures combined with a bit-to-symbol(s) mapping rule for directly mapping bits to multi-dimensional sparse codewords.
  • the increased design flexibility afforded by varying both the code/signature and the modulation mapping may provide greater multiple access performance.
  • SCMA can benefit from shaping gains of multi-dimensional constellations.
  • the mapping and the spreading may be separated.
  • NoMA communications systems based on more optimal codebooks or constellations could increase coding gain or lowered complexity of multiuser detection, for example.
  • the design of optimal NoMA codebooks or constellations is still a challenging problem. Although some simple methods for designing sub-optimal codebooks or constellations have been proposed for SCMA, for example, it is desirable to implement NoMA communications systems based on more optimal codebooks or constellations.
  • FIG. 1 is a diagram of a network 100 for communicating data.
  • the network 100 comprises a base station 110 having a coverage area 101 , a plurality of user equipments (UEs) 120 , and a backhaul network 130 .
  • the base station 110 establishes uplink (dashed line) and/or downlink (dotted line) connections with the UEs 120 , which serve to carry data from the UEs 120 to the base station 110 and vice-versa.
  • Data carried over the uplink/downlink connections may include data communicated between the UEs 120 , as well as data communicated to/from a remote-end (not shown) by way of the backhaul network 130 .
  • base station refers to any component (or collection of components) configured to provide wireless access to a network, such as a “Node B,” an enhanced Node B (eNB), a next generation Node B (gNB), a transmit/receive point (TRP), a macro-cell, a femtocell, a Wi-Fi access point (AP), and other wirelessly enabled devices.
  • Base stations may provide wireless access in accordance with one or more wireless communications protocols, e.g., 5th generation “New Radio” (NR), Long Term Evolution (LTE), LTE Advanced (LTE-A), High Speed Packet Access (HSPA), Wi-Fi 802.11a/b/g/n/ac, etc.
  • NR New Radio
  • LTE Long Term Evolution
  • LTE-A LTE Advanced
  • HSPA High Speed Packet Access
  • Wi-Fi 802.11a/b/g/n/ac etc.
  • the term “UE” refers to any component (or collection of components) capable of establishing a wireless connection with a base station, such as a mobile device, a mobile station (STA), and other wirelessly enabled devices.
  • the network 100 may comprise various other wireless devices, such as relays, low power nodes, etc.
  • FIG. 2 is a diagram of an embodiment transmitter 200 for generating a multiple access signal 245 from input data 205 .
  • Input data 205 may be payload data encoded in a binary form. The payload may be “user” data that is destined for a UE 120 , in a downlink transmission for example, or that is transmitted from the UE 120 to a base station 110 , in an uplink transmission for example.
  • Input data 205 may also be data directly communicated between two UEs 120 in a sidelink transmission.
  • Input data 205 may be received at a forward error correction encoder 210 .
  • the FEC encoder 210 may be any encoder configured to produce an error-detection/correction encoded bit stream, including (but not limited to) a Turbo encoder, a low-density parity-check (LDPC) encoder, and/or a polar encoder.
  • An error detection/correction encoded bit stream may be a bit-stream that includes error correction bits (e.g., parity bits, FEC bits, etc.) and/or error detection bits (e.g., cyclic redundancy check (CRC) bits, etc.).
  • the FEC encoder 210 may apply error detection/correction encoding to an input data that was not previously encoded with error detection/correction.
  • the FEC encoder 210 may apply error detection/correction encoding to an input data that already has some form of error detection/correction that is typically provided by an upper-layer function of whichever system implements the transmitter 200 .
  • the FEC encoder 210 generates a first bit-stream 215 and optionally forwards the first bit-stream 215 to one or more bit-level operators 220 .
  • the input data 205 is the first bit-stream 215 , and is received directly at the bit-level operator(s) 220 .
  • the bit-level operator 220 may be, for example, circuitry or software configured to execute a combination of bit-level operations (e.g., Boolean functions) in order to accomplish various functions such as bit interleaving, bit scrambling, full or partial bit-stream repetition, etc.
  • the function may be defined by one or more input parameters.
  • the bit-level operator 220 may further receive one or more control signals i 1 for adjusting the one or more parameters of the bit-level operator 220 .
  • the bit-level operator 220 generates a second bit-stream 225 and forwards the second bit-stream to one or more bit-to-symbol mapper(s) 230 .
  • the second bit-stream 225 may be the same as the input data or the first bit stream, in which case the bit-to-symbol mapper(s) 230 may directly receive the input data or the first bit stream.
  • the bit-to-symbol mapper 230 may also be known as a modulator.
  • the bit-to-symbol mapper 230 generates one or more symbols 235 from the second bit-stream 225 .
  • a symbol can be represented by one of many different complex-valued numbers, which each in turn represents a different binary sequence.
  • the mapper function encodes one or more bits into a symbol.
  • the bit-to-symbol mapper 230 includes a one-to-one mapping of unique bit sequences to unique symbols.
  • bit-to-symbol mappers examples include Quadrature Amplitude Modulation (QAM), Binary Phase Shift Keying (BPSK),
  • QAM Quadrature Phase Shift Keying
  • QAM may be further sub-categorized by the “level” of modulation, i.e., by the length of the input bit sequence and the resulting number of possible different output symbols, such as 16-QAM, 64-QAM, and 256-QAM, for example. Additionally, QPSK may also be known as 4-QAM.
  • the bit sequence-to-symbol mapping of a given mapper may be visually represented by a constellation diagram.
  • the bit-to-symbol mapper 230 may map the second bit-stream 225 to produce one or more symbols 235 according to a bit-to-symbol mapping rule.
  • the bit-to-symbol mapping rule may comprise a first mapper bit position associated with a first mapper error protection level and a second mapper bit position associated with a second mapper error protection level.
  • the first mapper error protection level may be greater than the second mapper error protection level. Details of the bit-to-symbol mapper 230 will be described in later sections of this disclosure below.
  • the transmitter 200 may also additionally, or alternatively, implement more complex mapping schemes, such as multi-dimensional mapping. Moreover, the transmitter 200 may implement multiple bit-to-symbol mappers 230 , for example, to map parallel bit-streams, such as duplicate bit-streams or interleaved bit-streams. Optionally, the mapping function may be defined by one or more input parameters. The bit-to-symbol mapper 230 may further receive one or more control signals i 2 for adjusting the one or more parameters of the bit-to-symbol mapper 230 .
  • the transmitter 200 may optionally comprise a spreader 237 that expands symbols 235 to a sequence of symbols 238 by using a specific spreading signature.
  • FIG. 2 depicts the spreader 237 as a separate component from the bit-to-symbol mapper 230 in some embodiments.
  • the bit-to-symbol mapping and code/signature-specific spreading are combined together such that bits are directly mapped by the bit-to-symbol mapper 230 to generate the sequence of symbols 238 .
  • the transmitter 200 further comprises a symbol-to-resource element (RE) mapper 240 , which receives the sequence of symbols 238 from the spreader.
  • the symbol-to-RE mapper 240 maps the sequence of symbols to a corresponding set of REs according to a given multiple access mapping rule, which results in the multiple access signal 245 .
  • the multiple access signal 245 is then transmitted to a receiver.
  • the multiple access mapping rule may be defined by one or more input parameters.
  • FIG. 3 is a constellation diagram 300 of a QPSK (or 4-QAM) modulator.
  • the x-axis real values
  • the y-axis imaging values
  • the constellation diagram shows four different symbols, at (1, j), ( ⁇ 1, j), ( ⁇ 1, ⁇ j), and (1, ⁇ j).
  • Each of the four symbols is mapped to respective inputs bit sequences (00), (10), (11), and (01).
  • the distance of the symbol point from the origin of the constellation represents the amplitude of the signal waveform; the angle of the symbol point relative a reference represents a phase difference of the signal waveform.
  • the QPSK-modulated signal comprises symbols with the same amplitude and different phase changes.
  • Other modulation schemes may comprise different symbol points on the constellation, resulting in different amplitudes and phase changes.
  • FIG. 4 is a schematic diagram showing an example operation 400 , by the symbol-to-RE mapper 240 , of mapping two QPSK symbols to specific REs. While FIG. 4 shows RE mapping in the frequency domain, the symbol-to-RE mapper 240 may also map the symbols to different REs in the time domain, as well as the frequency domain.
  • the communication system may be a system for multiple access communications. Some embodiments of this disclosure also apply to wireless communications in general, regardless of whether or not the system is configured for multiple access.
  • the protection levels of a codebook or a constellation may be more optimized based on the existing error correction code in order to increase the coding gain.
  • This disclosure describes the use of partitioning, or “cloud” partitioning, of codewords to create codebooks (for SCMA) or constellation (e.g., for LDS, PD-NoMA, orthogonal multiple access (OMA), or conventional non-MA) with different protection levels.
  • the described techniques optimize the power allocated to the bits constituting the binary label vector of the SCMA codeword, and belonging to the same protection level, based on the characteristics of the existing error-correction code, and more specifically, based on the UEP property of the error-correction code. In one embodiment, more power is allocated to bits with a higher protection level in order to improve the performance of the iterative decoding.
  • One embodiment implementation method assigns a binary label vector (b 0 i , b 1 i , . . .
  • the use of the binary label vector is for the ease of explanation.
  • the disclosed implementation methods are not constrained to the use of a specific labeling method of the constellation points or codewords.
  • the implementation methods are based on partitioning of codewords or constellation points into subsets (i.e., clouds) of codewords or constellation points. Steps for implementing a method according to aspects of the present disclosure are provided below.
  • ⁇ and i ⁇ j ⁇ ( ⁇ ) ⁇ , ⁇ i, j, ⁇ .
  • the protection levels decreases from 1 to L (i.e., the bits in are more protected than those in ).
  • the subsets are generated such that > ⁇ ⁇ , which leads to unequal error protections between subsets that do not belong to the same level.
  • the minimum distance between the codewords or constellation points in the same subset i.e., cloud
  • the method optimizes based on the existing error correction code.
  • the filled circles in clouds 502 , 504 , 506 , and 508 represent codewords.
  • the codewords belonging to a cloud l i have a binary label vector starting with s i .
  • the codewords belonging to different clouds are more distant from each other than codewords inside the same cloud, which leads to more protection for the bits b 0 , b 1 assigned to the clouds than bits b 2 , b 3 assigned to the codewords inside a cloud.
  • an implementation of the cloud partitioning method builds a codebook or constellation with L protection levels by superposing L codebooks or constellations with different average powers. For one-dimensional codebooks, this is equivalent to superposing two constellations with different average powers. For example, the superposition of two QPSK constellations, with average powers P 1 and P 2 respectively, produces a 16-QAM with two protection levels. The level of protection may be adjusted by the ratio P 1 /P 2 .
  • the one-dimensional UEP codebook (i.e., constellation) comprises 16 constellation points in four quadrants, 602 , 604 , 606 , and 608 .
  • Each constellation point represents a bit-to-symbol mapping.
  • the distance (d 1 ) between two constellation points in the same quadrant (e.g., quadrant 608 ) is smaller than the distance between two constellation points across two different quadrants (e.g., quadrants 606 and 608 ).
  • the 4 constellation points located in the same quadrant form a cloud.
  • the first two bits of the label of each constellation point are more robust against noise (i.e., more protected) than last two bits of the constellation point.
  • the constellation may be obtained by superposing two QPSK constellations with different average powers.
  • the implementation method applies the above cloud partitioning method to construct UEP SCMA codebooks.
  • This embodiment is more efficient for downlink transmissions (for uplink transmissions, other methods based on cloud partitioning may be implemented).
  • This method is not the only method that could be used to construct UEP SCMA codebooks based on cloud partitioning.
  • Other SCMA codebook implementation methods may be extended to create UEP SCMA codebooks after adding the cloud partitioning step into the implementation method.
  • M, N, K, V represent the codebook size for each user, the codebook dimension, the number of resources shared by users, and the number of users, respectively.
  • the implementation method constructs a mother constellation of dimension N with M points for each user u. The users do not necessarily have to have the same mother constellation. For each user u, the following steps are performed:
  • a conventional interleaver may be for the rows of even indices.
  • the same interleaver may be used to design UEP codebooks, but not to interleave two clouds at level +1 belonging to different clouds of level . Hence, at level 1, clouds between them and for >1 may be interleaved. Only clouds belonging to the same mother cloud may be interleaved at level +1.
  • One embodiment method may construct the final codebook for each user from its mother codebook.
  • F denotes the SCMA factor graph matrix of the size K ⁇ V.
  • d r denotes the number of users colliding over the same resource and
  • the embodiment may build a Latin matrix L, by replacing the non-zero elements of F by e i ⁇ r , where the ⁇ r are chosen such that L is Latin.
  • ⁇ u diag(L u ), where L u is the u th column of L without zero elements, and V u the mapping matrix of size K ⁇ N.
  • FIG. 7 illustrates the cloud-based partitioning for points constituting elements of one codebook dimension, with two protection levels.
  • the codebook has 16 points, and each protection level is assigned 2 bits.
  • the points constituting the elements of this dimension are obtained by superposing two one-dimensional lattices of four equally spaced symbols, having different average powers.
  • the binary label of each SCMA codeword is given in the following matrix.
  • columns c 1 -c 4 , c 5 -c 8 , c 9 -c 12 , and c 13 -c 16 form four different groups, respectively.
  • the Euclidian distance between two codewords of the same group is less than the Euclidian distance between two codewords of different groups.
  • codewords of the same group form a cloud. Since the two first bits b 0 , b 1 of the label vector are used to distinguish among the clouds, the two first bits b 0 , b 1 are more protected than bits b 2 , b 3 that permit to distinguish between codewords of the same cloud.
  • the embodiment allocates more power for bits b 0 , b 1 , which make bits b 0 , b 1 more robust against noise than bits b 2 , b 3 .
  • FIG. 8 shows an example LDPC code with variable nodes of degrees 3 and 1.
  • bit d 0 is mapped to a variable node of a degree of 3 while bit d 6 is mapped to a variable node of a degree of 1.
  • variable nodes of higher degrees converge faster than variable nodes of lower degrees.
  • variable nodes of higher degrees are well connected to the LDPC graph, their messages dominate in the LDPC graph.
  • variable nodes of higher degrees are assigned to bits b 0 , b 1 of the above UEP SCMA codebook, the messages of these variable nodes would be more and more reliable. This assignment may be achieved with or without using an interleaver between the LDPC encoder and the mapper.
  • FIG. 9 illustrates an embodiment interleaver between a LDPC encoder and an SCMA mapper.
  • the LDPC encoder 902 Before interleaving, the LDPC encoder 902 outputs the coded bits 904 . Coded bits 902 are sorted from higher degree to lower degree (e.g., d 0 , d 1 , d 2 , d 3 , d 4 , d 5 have a degree of 3 while d 6 , d 7 , d 8 , d 9 , d 10 , d 11 have a degree of 1).
  • the interleaver 906 interleaves coded bits 904 and outputs bits 908 .
  • each four consecutive bits w, x, y, z are arranged such that w, x have a degree of 3 and y, z have a degree of 1.
  • d 0 , d 1 , d 6 , d 7 may be the first four bits outputted by the interleaver 906 .
  • the 4 elements of the codewords are mapped into 4 resources. For example, a resource could be an OFDM subcarrier, a time slot, etc.
  • the bits b 0 , b 1 of the label vector of SCMA codewords may carry variable nodes of higher degrees. Thus, more power is allocated to higher degree variable nodes.
  • the UEP codebook may be optimized based on the variable node degree distribution of the LDPC code.
  • the above example embodiment uses natural labeling of codewords.
  • other labeling method may be used.
  • the labeling matrix is shown below.
  • two-dimensional UEP SCMA codebooks of 16 points of two protection levels for 6 users sharing 4 resources may be designed.
  • Each codeword has a binary label vector of 4 bits (b 0 , b 1 , b 2 , b 3 ).
  • the factor matrix is shown below.
  • Embodiment binary LDPC codes may be used as a channel code, chosen from 3GPP standard for 5G.
  • An embodiment interleaver adopted in the 3GPP standard may be used between a channel encoder (e.g., LDPC encoder 902 ) and a SCMA codebook mapper (e.g., SCMA mapper 910 ).
  • the message passing algorithm (MPA) for multi-user detection may perform 6 iterations.
  • the LDPC decoder may perform 20 iterations using sum-product decoding. There are no outer iterations between the multi-user detector and the channel decoder.
  • Binary LDPC codes that are adopted in the TS38.212 standard for 5G are irregular and systematic.
  • the codeword has the form shown in FIG. 10 .
  • the bits constituting the LDPC codeword 1000 adopted in the standard are sorted within the codeword.
  • Codeword 1000 includes N 1 bits 1002 connected to variable nodes of degrees higher than 1 (d>1) and N 2 bits 1004 connected to variable nodes of a degree of 1.
  • the variable nodes with the highest degrees are located at the beginning of the codeword 1000 .
  • the number N 2 of variable nodes of a degree of 1 depends on the code rate.
  • the input of the interleaver may be the LDPC codeword of length N: (d 0 , d 1 , d 2 , . . . , d N-2 , d N-1 ).
  • the output of the interleaver is the bit sequence (f 0 , f 1 , f 2 , . . . , f N-2 , f N-1 ) based on the following.
  • FIG. 11A shows the codeword before interleaving.
  • FIG. 11B shows the bit sequence after interleaving.
  • the interleaver maps the variable nodes of higher degrees to the first bits of the binary label vector, whereas the variable nodes of lower degrees are mapped to last bits of the binary label vector.
  • bits b 0 , b 1 are assigned to the first protection level
  • bits b 2 , b 3 are assigned to the second protection level.
  • the amplitude row vectors are optimized such that a n 1,u >a n 2,u for each dimension n ⁇ 1, . . . , N ⁇ and for each user u. In this way, more power are allocated to bits b 0 , b 1 , which improves the performance of iterative decoding since these bits are better connected than bits b 2 , b 3 .
  • a resource corresponds to an OFDM subcarrier.
  • the average error rate performance of the UEP SCMA codebooks obtained using the above embodiment implementation method are compared to the benchmark conventional SCMA codebooks ( are fixed) for the uplink SUI-3 channel using FFT of size 256.
  • the BER and FER are those of information bits only (parity bits not included).
  • the vectors are optimized for target frame error rates between 10 ⁇ 1 -10 ⁇ 4 .
  • FIG. 12 shows the average BER and FER curves for 20 and 100 LDPC decoding iterations.
  • the frame length of the LDPC code is 132 bits, and the code rate is 1 ⁇ 3.
  • UEP codebooks can achieve gains between 0.3 dB and 0.8 dB when E b /N 0 ⁇ 18 dB independently on the number of decoding iterations. When E b /N 0 >18 dB, the optimal values of are those given by the benchmark codebooks.
  • FIG. 13 shows the average BER and FER curves for 20 LDPC decoding iterations when the frame length is 1320 bits.
  • the code rate is 1 ⁇ 3.
  • a gain up to 0.65 dB can be achieved. The optimization of becomes more necessary for longer frame length.
  • a resource corresponds to a time slot.
  • the average error rate performance of the UEP SCMA codebooks obtained using the implementation method of the above embodiment are compared to the benchmark conventional SCMA codebooks of ( are fixed) for the downlink Rayleigh fading channel.
  • the codebooks proposed in the above embodiment are more efficient in the downlink scenario.
  • the gain obtained by optimizing the vectors A u increases when the code rate decreases for the LDPC codes.
  • the codebook may be adapted to the code rate.
  • the minimum error rate, for which the given by the benchmark codebooks are not optimal, is lower for lower rates.
  • FIG. 14 shows that, for a code rate 1 ⁇ 3 and a frame length 132 bits, up to 2.5 dB gain may be obtained for target frame error rates between 10 ⁇ 1 -10 ⁇ 4 .
  • FIG. 15 shows that, for a code rate 2 ⁇ 5 and a frame length 550 bits, up to 1.5 dB gain may be obtained for target frame error rates between 10 ⁇ 1 -10 ⁇ 4 .
  • FIG. 16 shows that, for a code rate 1 ⁇ 2 and a frame length 440 bits, up to 0.5 dB gain may be obtained for target frame error rates between 10 ⁇ 1 -4.10 ⁇ 3 .
  • the vectors given by the benchmark codes becomes optimal for target frame error rates lower than 4.10 ⁇ 3 .
  • Table 1 below shows the peak-to-average power ratio (PAPR) of the optimized UEP SCMA codebooks. Lower PAPR is obtained with respect to the conventional benchmark codebook (1.23 dB).
  • the above first embodiment uses a one-dimensional lattice of equally spaced complex symbols to build the mother constellation for each user.
  • any one-dimensional lattice e.g., star-QAM
  • the implementation method may also use the shuffling method to implement UEP SCMA codebooks.
  • the method may construct UEP SCMA codebooks to minimize the number of projection points in order to lower the complexity of multi-user detection.
  • the above first embodiment uses the rotation angles for each user in order to rotate the mother constellation. These angles have shown to give good performance in downlink Rayleigh channel.
  • the method may optimize these angles for each user based on the system model such as the channel model, and codebook parameters (e.g., the number of users, the dimension, and the size, etc.).
  • the method may construct the UEP codebooks for all users in order to optimize a certain performance criterion, such as error rate criteria (e.g., BER, FER, etc.) or information theoretic criteria (e.g., cut-off rate, mutual information, etc.) based on the channel model and the system model parameters (e.g., the number of users, the parameters of the error correcting code, etc.).
  • error rate criteria e.g., BER, FER, etc.
  • information theoretic criteria e.g., cut-off rate, mutual information, etc.
  • system model parameters e.g., the number of users, the parameters of the error correcting code, etc.
  • the above first embodiment illustrates how to construct UEP SCMA codebooks based on cloud partitioning described above.
  • the above first embodiment also shows that UEP codebooks could improve the error rate performance.
  • a method based on constellation rotation and interleaving described herein allows construction of UEP codebooks of arbitrary size and dimensions in a simple manner.
  • the amplitude row vectors in this method provide a degree of freedom to adjust the levels of protections based on the existing error-correction code.
  • LDS is used as a multiple access scheme.
  • FIG. 17 shows a LDS system 1700 with a constellation mapper 1706 , according to the second embodiment.
  • the LDS mapper is a special case of the SCMA code where the constellation points are repeated over non-zero resources.
  • FEC encoder 1702 generates coded bits 1704 .
  • the constellation mapper 1706 maps coded bits 1704 into constellation symbols 1708 .
  • each constellation symbol 1708 is spread over multiple resources using a spreading sequence 1712 based on spreading signatures 1710 .
  • the implementation method may construct the constellation using cloud partitioning method.
  • a practical method to implement a QAM constellation with L protection levels is to superpose L QAM constellation with different average powers, and the average powers may be optimized based on the existing error correction code.
  • X 16QAM For example, to construct an UEP constellation of 16 points X 16QAM and two protection levels.
  • the implementation method may superpose two QAM of 4 symbols (4-QAM):
  • X 16QAM ⁇ square root over (P 1 ) ⁇ X 4QAM ⁇ square root over (P 2 ) ⁇ X 4QAM , where denotes constellation superposition and
  • X 4QAM is a 4-QAM of the average power P.
  • the resulting constellation may look like the constellation in FIG. 6 .
  • P 1 P 2 is optimized based on the existing error correction code.
  • a bit-level operator e.g., an interleaver
  • the above second embodiment discloses a practical method to construct UEP constellations for LDS using constellation superposition.
  • the average power of each constellation involved in the superposition is optimized based on the existing error correction code.
  • the cloud partitioning method may be applied in the power domain NoMA.
  • the power domain NoMA users are distinguished by the users' transmitting average powers.
  • the implementation method may construct a UEP constellation for each user using the cloud partitioning method.
  • Average powers may be optimized based on the existing error correction code.
  • FIG. 18 shows a power-domain NoMA system 1800 with no spreading.
  • FEC encoder 1804 For user 1802 , FEC encoder 1804 generates coded bits 1806 . Then, constellation mapper 1808 (with power P 1 ) maps coded bits 1806 into constellation symbols 1810 .
  • FEC encoder 1814 For user 1812 , FEC encoder 1814 generates coded bits 1816 . Then, constellation mapper 1818 (with power P 2 ) maps coded bits 1816 into constellation symbols 1820 .
  • a bit-level operator e.g., an interleaver
  • the above third embodiment discloses a practical method to construct UEP constellations for PD-NoMA using constellation superposition.
  • the average power of each constellation involved in the superposition is optimized based on the existing error correction code.
  • FIG. 19A illustrates a flowchart of method 1900 for data communications by a device in a communications system, according to some embodiments.
  • Method 1900 may be carried out or performed by a transmitter of a communications device, such as the transmitter 200 in FIG. 2 .
  • Method 1900 may also be carried out or performed by routines, subroutines, or modules of software executed by one or more processors of the communications device. Coding of the software for carrying out or performing method 1900 is well within the scope of a person of ordinary skill in the art having regard to the present disclosure.
  • the method may include additional or fewer operations than those shown and described and may be carried out or performed in a different order.
  • Computer-readable code or instructions of the software executable by the one or more processor of the communications device may be stored on a non-transitory computer-readable medium, such as for example, memory of the communications device.
  • Method 1900 begins at operation 1902 , where a bit-to-symbol mapper of the transmitter may obtain a forward error correction (FEC) encoded bit stream.
  • the FEC encoded bit stream may be generated by an FEC encoder that encodes the payload data, such as FEC encoder 210 .
  • the bit-to-symbol mapper may obtain the FEC encoded bit stream from an interleaver between the FEC encoder and the bit-to-symbol mapper.
  • the FEC encoded bit stream may comprise a first FEC bit position associated with a first FEC error protection level and a second FEC bit position associated with a second FEC error protection level.
  • the first FEC error protection level may be greater than the second FEC error protection level.
  • the bit-to-symbol mapper may map the FEC encoded bit stream to produce a set of symbols according to a bit-to-symbol mapping rule.
  • the bit-to-symbol mapping rule may comprise a first mapper bit position associated with a first mapper error protection level and a second mapper bit position associated with a second mapper error protection level.
  • the first mapper error protection level may be greater than the second mapper error protection level.
  • the first FEC bit position may be mapped to the first mapper bit position, and the second FEC bit position may be mapped to the second mapper bit position.
  • the first FEC bit position may be mapped to the second mapper bit position, and the second FEC bit position may be mapped to the first mapper bit position.
  • the FEC encoded bit stream may be a low-density parity-check (LDPC) encoded bit stream.
  • the first FEC bit position may be associated with a first variable node of a LDPC code
  • the second FEC bit position may be associated with a second variable node of the LDPC code.
  • a degree of the first variable node may be higher than a degree of the second variable node.
  • the LDPC encoded bit stream may be an interleaved LDPC encoded bit stream comprising a plurality of bits having the first FEC error protection level interleaved with a plurality of bits having the second FEC error protection level.
  • the first mapper error protection level may correspond to a first minimum distance
  • the second mapper error protection level may correspond to a second minimum distance.
  • the first minimum distance may be greater than the second minimum distance.
  • the bit-to-symbol mapping rule may define a first subset of symbols separated by at least the first minimum distance from a second subset of symbols.
  • the symbols in the first subset may be each separated by at least the second minimum distance
  • the symbols in the second subset may be each separated by at least the second minimum distance.
  • the bit-to-symbol mapping rule may be a one-dimensional constellation for mapping bits to complex-valued constellation points.
  • the bit-to-symbol mapper may further spread the complex-valued constellation points to physical time and frequency resources.
  • the bit-to-symbol mapping rule may be a codebook for mapping and spreading bits to multi-dimensional codewords.
  • the bit-to-symbol mapping rule may be constructed by superposing a number of quadrature amplitude modulation (QAM) constellations with corresponding average powers associated with corresponding mapper error protection levels.
  • QAM quadrature amplitude modulation
  • the transmitter of the communications device may transmit the set of symbols in the communications system.
  • FIG. 19B illustrates a flowchart of method 1950 for data communications by a receiving device in a communications system, according to some embodiments.
  • Method 1950 may be carried out or performed by a receiver of a communications device.
  • Method 1950 may also be carried out or performed by routines, subroutines, or modules of software executed by one or more processors of the communications device. Coding of the software for carrying out or performing method 1950 is well within the scope of a person of ordinary skill in the art having regard to the present disclosure.
  • the method may include additional or fewer operations than those shown and described and may be carried out or performed in a different order.
  • Computer-readable code or instructions of the software executable by the one or more processor of the communications device may be stored on a non-transitory computer-readable medium, such as for example, memory of the communications device.
  • the receiver of the communications device may receive a set of symbols from the communications system.
  • the set of symbols may be mapped from a forward error correction (FEC) encoded bit stream according to a bit-to-symbol mapping rule.
  • the bit-to-symbol mapping rule may comprise a first mapper bit position associated with a first mapper error protection level and a second mapper bit position associated with a second mapper error protection level.
  • the FEC encoded bit stream may comprise a first FEC bit position associated with a first FEC error protection level and a second FEC bit position associated with a second FEC error protection level.
  • the first FEC error protection level may be greater than the second FEC error protection level.
  • the above embodiments describe NoMA transmitter and receiver implementations based on designs of unequal error protection codebooks or constellations with flexible degrees of protection levels.
  • the protection levels of the embodiment UEP codebooks or constellations can be optimized based on the existing error correction code and the system model parameters (e.g., the channel model, the number of users sharing same resources, etc.).
  • This disclosure describes the above embodiments with respect to NoMA systems. Techniques described above may also apply to wireless communications systems in general, including orthogonal multiple access (OMA) systems and non-MA systems.
  • OMA orthogonal multiple access
  • FIG. 20 illustrates a block diagram of an embodiment processing system 2000 for performing methods described herein.
  • the processing system 2000 includes a processor 2004 , a memory 2006 , and interfaces 2010 - 2014 .
  • the processor 2004 may be any component or collection of components adapted to perform computations and/or other processing related tasks
  • the memory 2006 may be any component or collection of components adapted to store programming and/or instructions for execution by the processor 2004 .
  • the memory 2006 includes a non-transitory computer readable medium.
  • the interfaces 2010 , 2012 , 2014 may be any component or collection of components that allow the processing system 2000 to communicate with other devices/components and/or a user.
  • one or more of the interfaces 2010 , 2012 , 2014 may be adapted to communicate data, control messages, or management messages from the processor 2004 to applications installed on a host device and/or a remote device.
  • one or more of the interfaces 2010 , 2012 , 2014 may be adapted to allow a user-side device (e.g., personal computer (PC), etc.) to interact/communicate with the processing system 2000 .
  • the processing system 2000 may include additional components not depicted in FIG. 20 , such as long term storage (e.g., non-volatile memory, etc.).
  • the processing system 2000 is included in a network device that is accessing, or part otherwise of, a telecommunications network.
  • the processing system 2000 is in a network-side device in a wireless or wireline telecommunications network, such as a base station, a relay station, a scheduler, a controller, a gateway, a router, an applications server, or any other device in the telecommunications network.
  • the processing system 2000 is in a user-side device accessing a wireless or wireline telecommunications network, such as a mobile station, a user equipment (UE), a personal computer (PC), a tablet, a wearable communications device (e.g., a smartwatch, etc.), or any other device adapted to access a telecommunications network.
  • a wireless or wireline telecommunications network such as a mobile station, a user equipment (UE), a personal computer (PC), a tablet, a wearable communications device (e.g., a smartwatch, etc.), or any other device adapted to access a telecommunications network.
  • FIG. 21 illustrates a block diagram of a transceiver 2100 adapted to transmit and receive signaling over a telecommunications network.
  • the transceiver 2100 may be installed in a host device. As shown, the transceiver 2100 comprises a network-side interface 2102 , a coupler 2104 , a transmitter 2106 (which may be implemented using all or some components of the transmitter 200 in FIG. 2 ), a receiver 2108 , a signal processor 2110 , and a device-side interface 2112 .
  • the network-side interface 2102 may include any component or collection of components adapted to transmit or receive signaling over a wireless or wireline telecommunications network.
  • the network-side interface 2102 may also include any component or collection of components adapted to transmit or receive signaling over a short-range interface.
  • the network-side interface 2102 may also include any component or collection of components adapted to transmit or receive signaling over a Uu interface.
  • the coupler 2104 may include any component or collection of components adapted to facilitate bi-directional communications over the network-side interface 2102 .
  • the transmitter 2106 may include any component or collection of components (e.g., up-converter, power amplifier, etc.) adapted to convert a baseband signal into a modulated carrier signal suitable for transmission over the network-side interface 2102 .
  • a means for transmitting an initial message of an access procedure may include transmitter 2106 .
  • the receiver 2108 may include any component or collection of components (e.g., down-converter, low noise amplifier, etc.) adapted to convert a carrier signal received over the network-side interface 2102 into a baseband signal.
  • a means for receiving mobile subscriber identifiers, initial downlink messages of access procedures, and forwarded requests to connect to a network may include receiver 2108 .
  • the signal processor 2110 may include any component or collection of components adapted to convert a baseband signal into a data signal suitable for communications over the device-side interface(s) 2112 , or vice-versa.
  • the device-side interface(s) 2112 may include any component or collection of components adapted to communicate data-signals between the signal processor 2110 and components within the host device (e.g., the processing system 2000 , local area network (LAN) ports, etc.).
  • the transceiver 2100 may transmit and receive signaling over any type of communications medium.
  • the transceiver 2100 transmits and receives signaling over a wireless medium.
  • the transceiver 2100 may be a wireless transceiver adapted to communicate in accordance with a wireless telecommunications protocol, such as a cellular protocol (e.g., long-term evolution (LTE), etc.), a wireless local area network (WLAN) protocol (e.g., Wi-Fi, etc.), or any other type of wireless protocol (e.g., Bluetooth, near field communications (NFC), etc.).
  • a wireless telecommunications protocol such as a cellular protocol (e.g., long-term evolution (LTE), etc.), a wireless local area network (WLAN) protocol (e.g., Wi-Fi, etc.), or any other type of wireless protocol (e.g., Bluetooth, near field communications (NFC), etc.).
  • LTE long-term evolution
  • WLAN wireless local area network
  • NFC near field
  • the network-side interface 2102 comprises one or more antenna/radiating elements.
  • the network-side interface 2102 may include a single antenna, multiple separate antennas, or a multi-antenna array configured for multi-layer communications, e.g., single input multiple output (SIMO), multiple input single output (MISO), multiple input multiple output (MIMO), etc.
  • the transceiver 2100 transmits and receives signaling over a wireline medium, e.g., twisted-pair cable, coaxial cable, optical fiber, etc.
  • Specific processing systems and/or transceivers may utilize all of the components shown, or only a subset of the components, and levels of integration may vary from device to device.

Abstract

In accordance with embodiments, methods for data communications are disclosed. A device obtains a forward error correction (FEC) encoded bit stream. The device maps the FEC encoded bit stream to produce a set of symbols according to a bit-to-symbol mapping rule. The bit-to-symbol mapping rule comprises a first mapper bit position associated with a first mapper error protection level and a second mapper bit position associated with a second mapper error protection level. The first mapper error protection level is greater than the second mapper error protection level. The device then transmits the set of symbols in the communications system.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS
This application is a continuation of International Patent Application No. PCT/CN2018/094693, filed on Jul. 5, 2018, entitled “Method and Apparatus for Wireless Communications with Unequal Error Protection,” which application is hereby incorporated by reference in its entirety.
TECHNICAL FIELD
The present disclosure relates generally to wireless communications and, in some particular embodiments, to methods and systems for multiple access (MA) communications.
BACKGROUND
Multiple access (MA) is a function of wireless communications systems in which multiple user equipments can share resources. Multiple access systems may be orthogonal or non-orthogonal. In orthogonal multiple access systems, such as time division multiple access (TDMA), frequency division multiple access (FDMA), and orthogonal frequency division multiple access (OFDMA), signals for different users are transmitted on different physical channel resources (e.g., time, frequency, or some combination). In non-orthogonal multiple access (NoMA) systems, such as code division multiple access (CDMA), interleave division multiple access (IDMA), interleave grid multiple access (IGMA), multi-user shared access (MUSA), low density signature (LDS), and sparse code multiple access (SCMA), there may be cross-correlation of signals for different user equipments. Intentionally introducing non-orthogonality will typically improve spectrum efficiency of the multiple access communications system; however, the non-orthogonality may also create challenges in terms of transmitter and receiver implementation. One such challenge is optimization for codebooks or constellations. Codebook or constellation implementations seek to increase the coding gain or to lower the complexity of the multi-user detector. However, conventional codebook or constellation implementations do not consider the existing error-correction code. It is desirable to improve the implementations of codebooks or constellations that take into account the unequal error protection (UEP) property of the error correction code.
SUMMARY
Technical advantages are generally achieved, by embodiments of this disclosure which describe methods and systems for multiple access communications.
In accordance with embodiments, methods for data communications are disclosed. A device obtains a forward error correction (FEC) encoded bit stream. The device maps the FEC encoded bit stream to produce a set of symbols according to a bit-to-symbol mapping rule. The bit-to-symbol mapping rule comprises a first mapper bit position associated with a first mapper error protection level and a second mapper bit position associated with a second mapper error protection level. The first mapper error protection level is greater than the second mapper error protection level. The device then transmits the set of symbols in the communications system.
Apparatuses, devices, as well as non-transitory computer-readable mediums and computer program products, for performing the methods are also provided.
BRIEF DESCRIPTION OF THE DRAWINGS
For a more complete understanding of the present invention, and the advantages thereof, reference is now made to the following description taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a diagram of an embodiment wireless communications network;
FIG. 2 is a diagram of an embodiment transmitter for transmitting a signal in the wireless communications network;
FIG. 3 is a constellation diagram of an example QPSK modulator;
FIG. 4 is a schematic diagram of an example symbol-to-RE mapping operation;
FIG. 5 illustrates an example UEP codebook or constellation with two protection levels and sixteen codewords;
FIG. 6 illustrates an example one-dimensional UEP codebook (i.e., constellation) which provides UEP symbols;
FIG. 7 illustrates example partitioning for one codebook dimension with two protection levels;
FIG. 8 shows an example LDPC code with variable nodes of the degrees of three and one;
FIG. 9 illustrates an embodiment interleaver between a LDPC encoder and an SCMA mapper, according to one embodiment;
FIG. 10 shows a codeword form in the TS38.212 standard;
FIG. 11A shows an example codeword before interleaving;
FIG. 11B shows an example bit sequence after interleaving;
FIG. 12 shows the average error rate for 20 and 100 LDPC decoding iterations for a code rate ⅓ when the frame length is 132 bits;
FIG. 13 shows the average error rate for 20 LDPC decoding iterations for a code rate ⅓ when the frame length is 1320 bits;
FIG. 14 shows the average error rate in the downlink Rayleigh fading channel for a code rate ⅓ when the frame length is 132 bits;
FIG. 15 shows the average error rate in the downlink Rayleigh fading channel for a code rate ⅖ when the frame length is 550 bits;
FIG. 16 shows the average error rate in the downlink Rayleigh fading channel for a code rate ½ when the frame length is 440 bits;
FIG. 17 shows an example LDS system with a constellation mapper, according to some embodiments;
FIG. 18 shows an example power-domain NoMA system with no spreading, according to some embodiments;
FIG. 19A illustrates a flowchart of method for data communications by a transmitting device in a communications system, according to some embodiments;
FIG. 19B illustrates a flowchart of method for data communications by a receiving device in a communications system, according to some embodiments;
FIG. 20 is a block diagram of an embodiment processing system for performing methods described herein; and
FIG. 21 is a block diagram of a transceiver adapted to transmit and receive signaling over a telecommunications network according to example embodiments described herein.
Corresponding numerals and symbols in the different figures generally refer to corresponding parts unless otherwise indicated. The figures are drawn to clearly illustrate the relevant aspects of the embodiments and are not necessarily drawn to scale.
DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
The making and using of embodiments of this disclosure are discussed in detail below. It should be appreciated, however, that the present invention provides many applicable inventive concepts that can be embodied in a wide variety of specific contexts. The specific embodiments discussed are merely illustrative of specific ways to make and use the invention, and do not limit the scope of the invention. These and other inventive aspects are described in greater detail below.
The operating of the current example embodiments and the structure thereof are discussed in detail below. It should be appreciated, however, that the present disclosure provides many applicable inventive concepts that can be embodied in a wide variety of specific contexts. The specific embodiments discussed are merely illustrative of specific structures of the embodiments and ways to operate the embodiments disclosed herein, and do not limit the scope of the disclosure. For example, while aspects of the present disclosure are particularly advantageous for multiple access communications, some embodiments may also be useful and applicable to wireless communications in general. Advantages of the present disclosure may be realized in a wireless communication system regardless of whether or not the system is configured for multiple access. Additional benefits may be gained in embodiments relating to non-orthogonal multiple access (NoMA).
NoMA improves the spectral efficiency of wireless radio access by enabling overloading (i.e., the number of multiplexed users can be larger than the number of resources). Main categories of NoMA techniques are code domain NoMA (e.g., SCMA and LDS) and power domain NoMA (PD-NoMA).
Power domain NoMA schemes achieve multiple access by allocating different power levels to different users. The receiver may use successive interference cancellation to perform multi-user detection.
Code domain NoMA schemes employ the concept of a multiple access code or signature that is specific to a user or a data stream. The multiple access code or signature modifies the transmitted data such that the transmitted data can be discriminated at a decoder. LDS is a code-domain NoMA technique where bits are mapped to a complex symbol according to a one-dimensional constellation, and the complex symbol is expanded to a sequence of complex symbols by using a specific spreading signature.
SCMA is also a code-domain NoMA technique and may be considered a generalization of LDS. In some variants of SCMA, the bit-to-symbol mapping and code/signature-specific spreading are combined together such that bits are directly mapped to multi-dimensional sparse codewords selected from user-specific SCMA codebooks. A “codebook” is a set of user-specific codes/signatures combined with a bit-to-symbol(s) mapping rule for directly mapping bits to multi-dimensional sparse codewords. The increased design flexibility afforded by varying both the code/signature and the modulation mapping may provide greater multiple access performance. By using multi-dimensional codebooks, SCMA can benefit from shaping gains of multi-dimensional constellations. In some other variants of SCMA, the mapping and the spreading may be separated.
NoMA communications systems based on more optimal codebooks or constellations could increase coding gain or lowered complexity of multiuser detection, for example. The design of optimal NoMA codebooks or constellations is still a challenging problem. Although some simple methods for designing sub-optimal codebooks or constellations have been proposed for SCMA, for example, it is desirable to implement NoMA communications systems based on more optimal codebooks or constellations.
FIG. 1 is a diagram of a network 100 for communicating data. The network 100 comprises a base station 110 having a coverage area 101, a plurality of user equipments (UEs) 120, and a backhaul network 130. As shown, the base station 110 establishes uplink (dashed line) and/or downlink (dotted line) connections with the UEs 120, which serve to carry data from the UEs 120 to the base station 110 and vice-versa. Data carried over the uplink/downlink connections may include data communicated between the UEs 120, as well as data communicated to/from a remote-end (not shown) by way of the backhaul network 130. As used herein, the term “base station” refers to any component (or collection of components) configured to provide wireless access to a network, such as a “Node B,” an enhanced Node B (eNB), a next generation Node B (gNB), a transmit/receive point (TRP), a macro-cell, a femtocell, a Wi-Fi access point (AP), and other wirelessly enabled devices. Base stations may provide wireless access in accordance with one or more wireless communications protocols, e.g., 5th generation “New Radio” (NR), Long Term Evolution (LTE), LTE Advanced (LTE-A), High Speed Packet Access (HSPA), Wi-Fi 802.11a/b/g/n/ac, etc. As used herein, the term “UE” refers to any component (or collection of components) capable of establishing a wireless connection with a base station, such as a mobile device, a mobile station (STA), and other wirelessly enabled devices. In some embodiments, the network 100 may comprise various other wireless devices, such as relays, low power nodes, etc.
FIG. 2 is a diagram of an embodiment transmitter 200 for generating a multiple access signal 245 from input data 205. Input data 205 may be payload data encoded in a binary form. The payload may be “user” data that is destined for a UE 120, in a downlink transmission for example, or that is transmitted from the UE 120 to a base station 110, in an uplink transmission for example. Input data 205 may also be data directly communicated between two UEs 120 in a sidelink transmission. Input data 205 may be received at a forward error correction encoder 210.
The FEC encoder 210 may be any encoder configured to produce an error-detection/correction encoded bit stream, including (but not limited to) a Turbo encoder, a low-density parity-check (LDPC) encoder, and/or a polar encoder. An error detection/correction encoded bit stream may be a bit-stream that includes error correction bits (e.g., parity bits, FEC bits, etc.) and/or error detection bits (e.g., cyclic redundancy check (CRC) bits, etc.). The FEC encoder 210 may apply error detection/correction encoding to an input data that was not previously encoded with error detection/correction. Alternatively, the FEC encoder 210 may apply error detection/correction encoding to an input data that already has some form of error detection/correction that is typically provided by an upper-layer function of whichever system implements the transmitter 200. The FEC encoder 210 generates a first bit-stream 215 and optionally forwards the first bit-stream 215 to one or more bit-level operators 220. Alternatively, the input data 205 is the first bit-stream 215, and is received directly at the bit-level operator(s) 220.
The bit-level operator 220 may be, for example, circuitry or software configured to execute a combination of bit-level operations (e.g., Boolean functions) in order to accomplish various functions such as bit interleaving, bit scrambling, full or partial bit-stream repetition, etc. Optionally, the function may be defined by one or more input parameters. Thus, the bit-level operator 220 may further receive one or more control signals i1 for adjusting the one or more parameters of the bit-level operator 220. The bit-level operator 220 generates a second bit-stream 225 and forwards the second bit-stream to one or more bit-to-symbol mapper(s) 230. Alternatively, the second bit-stream 225 may be the same as the input data or the first bit stream, in which case the bit-to-symbol mapper(s) 230 may directly receive the input data or the first bit stream. The bit-to-symbol mapper 230 may also be known as a modulator.
The bit-to-symbol mapper 230 generates one or more symbols 235 from the second bit-stream 225. Typically, a symbol can be represented by one of many different complex-valued numbers, which each in turn represents a different binary sequence. In this way, the mapper function encodes one or more bits into a symbol. In other words, the bit-to-symbol mapper 230 includes a one-to-one mapping of unique bit sequences to unique symbols.
Examples of common bit-to-symbol mappers include Quadrature Amplitude Modulation (QAM), Binary Phase Shift Keying (BPSK),
π 2 - BPSK
modulation, and Quadrature Phase Shift Keying (QPSK). QAM may be further sub-categorized by the “level” of modulation, i.e., by the length of the input bit sequence and the resulting number of possible different output symbols, such as 16-QAM, 64-QAM, and 256-QAM, for example. Additionally, QPSK may also be known as 4-QAM. The bit sequence-to-symbol mapping of a given mapper may be visually represented by a constellation diagram.
The bit-to-symbol mapper 230 may map the second bit-stream 225 to produce one or more symbols 235 according to a bit-to-symbol mapping rule. The bit-to-symbol mapping rule may comprise a first mapper bit position associated with a first mapper error protection level and a second mapper bit position associated with a second mapper error protection level. The first mapper error protection level may be greater than the second mapper error protection level. Details of the bit-to-symbol mapper 230 will be described in later sections of this disclosure below.
The transmitter 200 may also additionally, or alternatively, implement more complex mapping schemes, such as multi-dimensional mapping. Moreover, the transmitter 200 may implement multiple bit-to-symbol mappers 230, for example, to map parallel bit-streams, such as duplicate bit-streams or interleaved bit-streams. Optionally, the mapping function may be defined by one or more input parameters. The bit-to-symbol mapper 230 may further receive one or more control signals i2 for adjusting the one or more parameters of the bit-to-symbol mapper 230.
The transmitter 200 may optionally comprise a spreader 237 that expands symbols 235 to a sequence of symbols 238 by using a specific spreading signature. FIG. 2 depicts the spreader 237 as a separate component from the bit-to-symbol mapper 230 in some embodiments. In other embodiments, the bit-to-symbol mapping and code/signature-specific spreading are combined together such that bits are directly mapped by the bit-to-symbol mapper 230 to generate the sequence of symbols 238.
The transmitter 200 further comprises a symbol-to-resource element (RE) mapper 240, which receives the sequence of symbols 238 from the spreader. The symbol-to-RE mapper 240 maps the sequence of symbols to a corresponding set of REs according to a given multiple access mapping rule, which results in the multiple access signal 245. The multiple access signal 245 is then transmitted to a receiver. Optionally, the multiple access mapping rule may be defined by one or more input parameters.
FIG. 3 is a constellation diagram 300 of a QPSK (or 4-QAM) modulator. The x-axis (real values) represents an in-phase component of a signal while the y-axis (imaginary values) represents a quadrature component of the signal. The constellation diagram shows four different symbols, at (1, j), (−1, j), (−1, −j), and (1, −j). Each of the four symbols is mapped to respective inputs bit sequences (00), (10), (11), and (01). The distance of the symbol point from the origin of the constellation represents the amplitude of the signal waveform; the angle of the symbol point relative a reference represents a phase difference of the signal waveform. Thus, the QPSK-modulated signal comprises symbols with the same amplitude and different phase changes. Other modulation schemes may comprise different symbol points on the constellation, resulting in different amplitudes and phase changes.
FIG. 4 is a schematic diagram showing an example operation 400, by the symbol-to-RE mapper 240, of mapping two QPSK symbols to specific REs. While FIG. 4 shows RE mapping in the frequency domain, the symbol-to-RE mapper 240 may also map the symbols to different REs in the time domain, as well as the frequency domain.
Conventional implementations of codebooks or constellations assume the environment in an uncoded system. Conventional methods do not take into account implementations of an error-correction code in the codebook design. In a real-world communications system, an error-correction code is often used and may introduce unequal protections between coded bits (i.e., some bits are more protected than others). For example, a coded bit mapped to a high-degree variable node in LDPC codes is more protected than a coded-bit mapped to a low-degree variable node. Codebook design methods proposed for conventional NoMA systems do not take into account the possible unequal error protection property of the error-correction code.
It is an objective of this disclosure to provide a communications system based on implementations of codebooks or constellations that take into account unequal error protections. The communication system may be a system for multiple access communications. Some embodiments of this disclosure also apply to wireless communications in general, regardless of whether or not the system is configured for multiple access. The protection levels of a codebook or a constellation may be more optimized based on the existing error correction code in order to increase the coding gain.
This disclosure describes the use of partitioning, or “cloud” partitioning, of codewords to create codebooks (for SCMA) or constellation (e.g., for LDS, PD-NoMA, orthogonal multiple access (OMA), or conventional non-MA) with different protection levels. The described techniques optimize the power allocated to the bits constituting the binary label vector of the SCMA codeword, and belonging to the same protection level, based on the characteristics of the existing error-correction code, and more specifically, based on the UEP property of the error-correction code. In one embodiment, more power is allocated to bits with a higher protection level in order to improve the performance of the iterative decoding.
In one example implementation of codebooks in the case of SCMA and constellations in the case of LDS, PD-NOMA, OMA, or conventional non-MA C represents an SCMA codebook (ci, i=1, . . . , M are codewords) or a constellation in LDS, PD-NOMA, OMA, or conventional non-MA (ci, i=1, . . . , M are constellation points). C may be of the size M=2m, with L≤m protection levels. One embodiment implementation method assigns a binary label vector (b0 i, b1 i, . . . , bm-1 i), bj i∈{0, 1} to each codeword or constellation point ci, i=1, . . . , M. The use of the binary label vector is for the ease of explanation. The disclosed implementation methods are not constrained to the use of a specific labeling method of the constellation points or codewords. The implementation methods are based on partitioning of codewords or constellation points into subsets (i.e., clouds) of codewords or constellation points. Steps for implementing a method according to aspects of the present disclosure are provided below.
The method assigns one protection level
Figure US11456820-20220927-P00001
Figure US11456820-20220927-P00002
={1, . . . , L} to each bit b∈{b0, b1, . . . , bm-1} of the binary label vector of the codebook or constellation. Here,
Figure US11456820-20220927-P00003
denotes the set of the bits with the same protection level
Figure US11456820-20220927-P00004
. It may be assumed that
Figure US11456820-20220927-P00005
≠Ø and
Figure US11456820-20220927-P00006
i
Figure US11456820-20220927-P00007
j={(Ø)}, ∀i, j,
Figure US11456820-20220927-P00008
Figure US11456820-20220927-P00009
.
Let
Figure US11456820-20220927-P00010
=
Figure US11456820-20220927-P00011
. Here, |⋅| is the cardinality. For each level
Figure US11456820-20220927-P00012
, the method generates
Figure US11456820-20220927-P00013
subsets,
Figure US11456820-20220927-P00014
li, i=1 . . .
Figure US11456820-20220927-P00015
, such that the minimum distance between two subsets in the same protection level is equal to
Figure US11456820-20220927-P00016
. Each subset (i.e., cloud)
Figure US11456820-20220927-P00017
li has a binary label vector
Figure US11456820-20220927-P00018
, which represents a special realization of the set
Figure US11456820-20220927-P00019
, For example, if
Figure US11456820-20220927-P00020
1={bi, bj}, the method may generate 4 subsets for level 1. The 4 subsets (i.e., clouds)
Figure US11456820-20220927-P00021
li, i=1 . . . 4 may be labeled s1 1={00}, s2 1={01}, s3 1={10}, s4 1={11}, respectively. Each codeword or constellation point in C with
Figure US11456820-20220927-P00022
={bi, bj}=
Figure US11456820-20220927-P00023
belongs to the kth subset
Figure US11456820-20220927-P00024
lk of level
Figure US11456820-20220927-P00025
.
Without loss of generality, according to some embodiments, it may be assumed that the protection levels decreases from 1 to L (i.e., the bits in
Figure US11456820-20220927-P00026
are more protected than those in
Figure US11456820-20220927-P00027
). Thus, the subsets are generated such that
Figure US11456820-20220927-P00028
>
Figure US11456820-20220927-P00029
Figure US11456820-20220927-P00030
Figure US11456820-20220927-P00031
, which leads to unequal error protections between subsets that do not belong to the same level. Moreover, for each level
Figure US11456820-20220927-P00032
, the minimum distance between the codewords or constellation points in the same subset (i.e., cloud) should be less than
Figure US11456820-20220927-P00033
, which leads to unequal error protections between the codewords or constellation points that do not belong to the same subset. Under these constraints,
Figure US11456820-20220927-P00034
is optimized to improve the system performance. Specifically, in one embodiment, the method optimizes
Figure US11456820-20220927-P00035
based on the existing error correction code.
FIG. 5 shows a codebook (or constellation) of M=16 codewords (or constellation points) with two protection levels, according to some example embodiments. The four clouds 502, 504, 506, and 508 are those of the first protection level,
Figure US11456820-20220927-P00036
=1. The filled circles in clouds 502, 504, 506, and 508 represent codewords. The codewords belonging to a cloud
Figure US11456820-20220927-P00037
li have a binary label vector starting with si. For example, codewords in cloud 402 have a labeling (0, 0, b2, b3) (i.e., b0=0, bi=0). The codewords belonging to different clouds are more distant from each other than codewords inside the same cloud, which leads to more protection for the bits b0, b1 assigned to the clouds than bits b2, b3 assigned to the codewords inside a cloud.
In one embodiment, an implementation of the cloud partitioning method builds a codebook or constellation with L protection levels by superposing L codebooks or constellations with different average powers. For one-dimensional codebooks, this is equivalent to superposing two constellations with different average powers. For example, the superposition of two QPSK constellations, with average powers P1 and P2 respectively, produces a 16-QAM with two protection levels. The level of protection may be adjusted by the ratio P1/P2.
One example of a one-dimensional UEP codebook (i.e., constellation) is shown in FIG. 6. The one-dimensional UEP codebook (i.e., constellation) comprises 16 constellation points in four quadrants, 602, 604, 606, and 608. Each constellation point represents a bit-to-symbol mapping. The distance (d1) between two constellation points in the same quadrant (e.g., quadrant 608) is smaller than the distance between two constellation points across two different quadrants (e.g., quadrants 606 and 608). Thus, the 4 constellation points located in the same quadrant form a cloud. The first two bits of the label of each constellation point are more robust against noise (i.e., more protected) than last two bits of the constellation point. The constellation may be obtained by superposing two QPSK constellations with different average powers.
In a first embodiment, the implementation method applies the above cloud partitioning method to construct UEP SCMA codebooks. This embodiment is more efficient for downlink transmissions (for uplink transmissions, other methods based on cloud partitioning may be implemented). This method is not the only method that could be used to construct UEP SCMA codebooks based on cloud partitioning. Other SCMA codebook implementation methods may be extended to create UEP SCMA codebooks after adding the cloud partitioning step into the implementation method.
In the first embodiment, M, N, K, V represent the codebook size for each user, the codebook dimension, the number of resources shared by users, and the number of users, respectively. The implementation method constructs a mother constellation of dimension N with M points for each user u. The users do not necessarily have to have the same mother constellation. For each user u, the following steps are performed:
At each protection level
Figure US11456820-20220927-P00038
, define the row vector
Figure US11456820-20220927-P00039
=[s1, s2, . . . ,
Figure US11456820-20220927-P00040
], where sm=(2m−1−
Figure US11456820-20220927-P00041
). (1+i), m=1, . . . , Ml and i=√{square root over (−1)}. Here,
Figure US11456820-20220927-P00042
represents a one-dimensional lattice of equally spaced complex symbols.
For each level
Figure US11456820-20220927-P00043
, define the “amplitude” row vector,
Figure US11456820-20220927-P00044
=[
Figure US11456820-20220927-P00045
, . . . ,
Figure US11456820-20220927-P00046
]. Since it may be assumed that level
Figure US11456820-20220927-P00047
is more protected than level j if
Figure US11456820-20220927-P00048
<j,
Figure US11456820-20220927-P00049
>an j,u for each dimension n∈{1, . . . , N}.
Figure US11456820-20220927-P00050
is a new parameter added. The codebooks in conventional methods are a particular case of UEP codebooks when the values of
Figure US11456820-20220927-P00051
are fixed and not optimized based on the existing error correction code.
For each n∈{1, . . . , N}, construct the one-dimensional lattice Rn u of M complex symbols by superposing L constellations an 1,uS1
Figure US11456820-20220927-P00052
. . .
Figure US11456820-20220927-P00053
an L,uSL, where
Figure US11456820-20220927-P00054
stands for constellation superposition.
Build a matrix Ωu of size N×M. The nth row of Ωu is given by Rn u·e n , where
θ n = ( n - 1 ) π MN , n = 1 , , N .
Construct the mother constellation Mc u for user u, by interleaving the elements of some rows of Ωu in order to reduce the peak-to-average power ratio (PAPR). For example, a conventional interleaver may be for the rows of even indices. The same interleaver may be used to design UEP codebooks, but not to interleave two clouds at level
Figure US11456820-20220927-P00055
+1 belonging to different clouds of level
Figure US11456820-20220927-P00056
. Hence, at level 1, clouds between them and for
Figure US11456820-20220927-P00057
>1 may be interleaved. Only clouds belonging to the same mother cloud may be interleaved at level
Figure US11456820-20220927-P00058
+1.
Apply a rotation for each dimension of Mc u depending on the user index, in order to increase the diversity between user codebooks. One embodiment method may construct the final codebook for each user from its mother codebook. F denotes the SCMA factor graph matrix of the size K×V. Let fku denote the element of F located at the kth row and uth column. fku=1 if user u is using resource k; otherwise, it is equal to 0. Here, dr denotes the number of users colliding over the same resource and
φ r = ( r - 1 ) 2 π Md r + 2 π M e r
for r=1, . . . , dr, where er is an arbitrary member of
Figure US11456820-20220927-P00059
. The embodiment may build a Latin matrix L, by replacing the non-zero elements of F by eiφr, where the φr are chosen such that L is Latin. For each user u, Δu=diag(Lu), where Lu is the uth column of L without zero elements, and Vu the mapping matrix of size K×N. Then, the codebook of user u is given by Cu=Vu·Δu·Mc u.
FIG. 7 illustrates the cloud-based partitioning for points constituting elements of one codebook dimension, with two protection levels. The codebook has 16 points, and each protection level is assigned 2 bits. The points constituting the elements of this dimension are obtained by superposing two one-dimensional lattices of four equally spaced symbols, having different average powers.
An example of a 16-point SCMA codebook C with two protection levels constructed using the above implementation method is shown below:
Re(C)=
Re ( C ) = [ 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 - 0.259 - 0.243 - 0.28 - 0.212 - 0.102 - 0.086 - 0.07 - 0.055 0.055 0.07 0.086 0.102 0.212 0.229 0.243 0.259 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 - 0.012 - 0.016 - 0.02 - 0.024 0.048 0.052 0.056 0.06 - 0.06 - 0.056 - 0.052 - 0.048 0.024 0.02 0.016 0.012 ] Im ( C ) = [ 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 - 0.259 - 0.243 - 0.28 - 0.212 - 0.102 - 0.086 - 0.07 - 0.055 0.055 0.07 0.086 0.102 0.212 0.229 0.243 0.259 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 - 0.073 - 0.097 - 0.121 - 0.146 0.292 0.316 0.341 0.365 - 0.365 - 0.341 - 0.316 - 0.292 0.146 0.121 0.097 0.073 ]
For clarity of explanation, the matrices of the real and imaginary parts of the codebook C are given separately. The above codebook matrix has 16 columns (representing codewords) and 4 rows (representing resources). Each column i=1, . . . , 16 represents an SCMA codeword ci occupying 4 resources. The binary label of each SCMA codeword is given in the following matrix.
[ \ c 1 c 2 c 3 c 4 c 5 c 6 c 7 c 8 c 9 c 10 c 11 c 12 c 13 c 14 c 15 c 16 b 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 b 1 0 0 0 0 1 1 1 1 0 0 0 0 1 1 1 1 b 2 0 0 1 1 0 0 1 1 0 0 1 1 0 0 1 1 b 3 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 ]
Here, columns c1-c4, c5-c8, c9-c12, and c13-c16 form four different groups, respectively. The Euclidian distance between two codewords of the same group is less than the Euclidian distance between two codewords of different groups. Thus, codewords of the same group form a cloud. Since the two first bits b0, b1 of the label vector are used to distinguish among the clouds, the two first bits b0, b1 are more protected than bits b2, b3 that permit to distinguish between codewords of the same cloud. In other terms, the embodiment allocates more power for bits b0, b1, which make bits b0, b1 more robust against noise than bits b2, b3.
FIG. 8 shows an example LDPC code with variable nodes of degrees 3 and 1. For example, bit d0 is mapped to a variable node of a degree of 3 while bit d6 is mapped to a variable node of a degree of 1. During iterative LDPC decoding, variable nodes of higher degrees converge faster than variable nodes of lower degrees. Moreover, since variable nodes of higher degrees are well connected to the LDPC graph, their messages dominate in the LDPC graph. Thus, if variable nodes of higher degrees are assigned to bits b0, b1 of the above UEP SCMA codebook, the messages of these variable nodes would be more and more reliable. This assignment may be achieved with or without using an interleaver between the LDPC encoder and the mapper.
FIG. 9 illustrates an embodiment interleaver between a LDPC encoder and an SCMA mapper. Before interleaving, the LDPC encoder 902 outputs the coded bits 904. Coded bits 902 are sorted from higher degree to lower degree (e.g., d0, d1, d2, d3, d4, d5 have a degree of 3 while d6, d7, d8, d9, d10, d11 have a degree of 1). The interleaver 906 interleaves coded bits 904 and outputs bits 908. In bits 908, each four consecutive bits w, x, y, z are arranged such that w, x have a degree of 3 and y, z have a degree of 1. For example, d0, d1, d6, d7 may be the first four bits outputted by the interleaver 906. Then, the SCMA mapper 910 maps d0, d1, d6, d7 to a SCMA codeword (i.e., (b0, b1, b2, b3)=(do, d1, d6, d7)). The output of the SCMA mapper 910 may be a codeword occupying 4 resources. For example, if (do, d1, d6, d7)=(0, 0, 0, 0), the output of the SCMA mapper will be (0, −0.259-0.259i, 0, −0.012-0.073i). The 4 elements of the codewords are mapped into 4 resources. For example, a resource could be an OFDM subcarrier, a time slot, etc. In this way, the bits b0, b1 of the label vector of SCMA codewords may carry variable nodes of higher degrees. Thus, more power is allocated to higher degree variable nodes. The UEP codebook may be optimized based on the variable node degree distribution of the LDPC code.
The above example embodiment uses natural labeling of codewords. In general, other labeling method may be used. For example, with a Gray labeling, the labeling matrix is shown below.
[ \ c 1 c 2 c 3 c 4 c 5 c 6 c 7 c 8 c 9 c 10 c 11 c 12 c 13 c 14 c 15 c 16 b 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 b 1 0 0 0 0 1 1 1 1 1 1 1 1 0 0 0 0 b 2 0 0 1 1 1 1 0 0 0 0 1 1 1 1 0 0 b 3 0 1 1 0 0 1 1 0 0 1 1 0 0 1 1 0 ]
In one example, two-dimensional UEP SCMA codebooks of 16 points of two protection levels for 6 users sharing 4 resources may be designed. Each codeword has a binary label vector of 4 bits (b0, b1, b2, b3). The factor matrix is shown below.
F = [ 0 1 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 1 0 0 1 1 0 ]
Embodiment binary LDPC codes may be used as a channel code, chosen from 3GPP standard for 5G. An embodiment interleaver adopted in the 3GPP standard may be used between a channel encoder (e.g., LDPC encoder 902) and a SCMA codebook mapper (e.g., SCMA mapper 910). At the receiver, the message passing algorithm (MPA) for multi-user detection may perform 6 iterations. Unless otherwise stated, the LDPC decoder may perform 20 iterations using sum-product decoding. There are no outer iterations between the multi-user detector and the channel decoder.
Binary LDPC codes that are adopted in the TS38.212 standard for 5G are irregular and systematic. The codeword has the form shown in FIG. 10. The bits constituting the LDPC codeword 1000 adopted in the standard are sorted within the codeword. Codeword 1000 includes N1 bits 1002 connected to variable nodes of degrees higher than 1 (d>1) and N2 bits 1004 connected to variable nodes of a degree of 1. Moreover, the variable nodes with the highest degrees are located at the beginning of the codeword 1000. N=N1+N2 may be the codeword length. The number N2 of variable nodes of a degree of 1 depends on the code rate.
The input of the interleaver may be the LDPC codeword of length N: (d0, d1, d2, . . . , dN-2, dN-1). M=2m may be the SCMA codebook size (i.e., the number of codewords). The output of the interleaver is the bit sequence (f0, f1, f2, . . . , fN-2, fN-1) based on the following.
f i + j · m = d j + i · N m , j = 0 , , N m - 1 , i = 0 , , m - 1
When M=16 (m=4), the codeword before interleaving is shown in FIG. 11A. FIG. 11B shows the bit sequence after interleaving. Thus, the one-degree bits may be mapped to the last bits of the binary label vector of SCMA codewords. Consequently, the interleaver maps the variable nodes of higher degrees to the first bits of the binary label vector, whereas the variable nodes of lower degrees are mapped to last bits of the binary label vector. Hence, bits b0, b1 are assigned to the first protection level, and bits b2, b3 are assigned to the second protection level. The amplitude row vectors
Figure US11456820-20220927-P00060
are optimized such that an 1,u>an 2,u for each dimension n∈{1, . . . , N} and for each user u. In this way, more power are allocated to bits b0, b1, which improves the performance of iterative decoding since these bits are better connected than bits b2, b3.
For uplink single input single output (SISO) SUI-3 channel model with FFT of the size 256, a resource corresponds to an OFDM subcarrier. The average error rate performance of the UEP SCMA codebooks obtained using the above embodiment implementation method (where
Figure US11456820-20220927-P00061
are optimized based on the LDPC code) are compared to the benchmark conventional SCMA codebooks (
Figure US11456820-20220927-P00062
are fixed) for the uplink SUI-3 channel using FFT of size 256. The BER and FER are those of information bits only (parity bits not included). The vectors
Figure US11456820-20220927-P00063
are optimized for target frame error rates between 10−1-10−4.
FIG. 12 shows the average BER and FER curves for 20 and 100 LDPC decoding iterations. The frame length of the LDPC code is 132 bits, and the code rate is ⅓. UEP codebooks can achieve gains between 0.3 dB and 0.8 dB when Eb/N0≤18 dB independently on the number of decoding iterations. When Eb/N0>18 dB, the optimal values of
Figure US11456820-20220927-P00064
are those given by the benchmark codebooks.
FIG. 13 shows the average BER and FER curves for 20 LDPC decoding iterations when the frame length is 1320 bits. The code rate is ⅓. A gain up to 0.65 dB can be achieved. The optimization of
Figure US11456820-20220927-P00064
becomes more necessary for longer frame length.
For downlink SISO Rayleigh fading channel, a resource corresponds to a time slot. The average error rate performance of the UEP SCMA codebooks obtained using the implementation method of the above embodiment (where
Figure US11456820-20220927-P00064
are optimized based on the LDPC code) are compared to the benchmark conventional SCMA codebooks of (
Figure US11456820-20220927-P00064
are fixed) for the downlink Rayleigh fading channel. The codebooks proposed in the above embodiment are more efficient in the downlink scenario. The gain obtained by optimizing the vectors Au increases when the code rate decreases for the LDPC codes. Hence, the codebook may be adapted to the code rate. Moreover, the minimum error rate, for which the
Figure US11456820-20220927-P00064
given by the benchmark codebooks are not optimal, is lower for lower rates. FIG. 14 shows that, for a code rate ⅓ and a frame length 132 bits, up to 2.5 dB gain may be obtained for target frame error rates between 10−1-10−4. FIG. 15 shows that, for a code rate ⅖ and a frame length 550 bits, up to 1.5 dB gain may be obtained for target frame error rates between 10−1-10−4. FIG. 16 shows that, for a code rate ½ and a frame length 440 bits, up to 0.5 dB gain may be obtained for target frame error rates between 10−1-4.10−3. The vectors
Figure US11456820-20220927-P00064
given by the benchmark codes becomes optimal for target frame error rates lower than 4.10−3.
Table 1 below shows the peak-to-average power ratio (PAPR) of the optimized UEP SCMA codebooks. Lower PAPR is obtained with respect to the conventional benchmark codebook (1.23 dB).
TABLE 1
PAPR
Rate [dB]
0.2798
0.5921
½ 1.0397
The above first embodiment uses a one-dimensional lattice of equally spaced complex symbols to build the mother constellation for each user. In a more general way, any one-dimensional lattice (e.g., star-QAM) may be used. The implementation method may also use the shuffling method to implement UEP SCMA codebooks. Moreover, the method may construct UEP SCMA codebooks to minimize the number of projection points in order to lower the complexity of multi-user detection.
The above first embodiment uses the rotation angles for each user in order to rotate the mother constellation. These angles have shown to give good performance in downlink Rayleigh channel. In general, the method may optimize these angles for each user based on the system model such as the channel model, and codebook parameters (e.g., the number of users, the dimension, and the size, etc.).
The method may construct the UEP codebooks for all users in order to optimize a certain performance criterion, such as error rate criteria (e.g., BER, FER, etc.) or information theoretic criteria (e.g., cut-off rate, mutual information, etc.) based on the channel model and the system model parameters (e.g., the number of users, the parameters of the error correcting code, etc.).
The above first embodiment illustrates how to construct UEP SCMA codebooks based on cloud partitioning described above. The above first embodiment also shows that UEP codebooks could improve the error rate performance. A method based on constellation rotation and interleaving described herein allows construction of UEP codebooks of arbitrary size and dimensions in a simple manner. Moreover, the amplitude row vectors
Figure US11456820-20220927-P00065
in this method provide a degree of freedom to adjust the levels of protections based on the existing error-correction code.
In a second embodiment, LDS is used as a multiple access scheme. FIG. 17 shows a LDS system 1700 with a constellation mapper 1706, according to the second embodiment. The LDS mapper is a special case of the SCMA code where the constellation points are repeated over non-zero resources. In LDS, FEC encoder 1702 generates coded bits 1704. The constellation mapper 1706 maps coded bits 1704 into constellation symbols 1708. Then, each constellation symbol 1708 is spread over multiple resources using a spreading sequence 1712 based on spreading signatures 1710. The implementation method may construct the constellation using cloud partitioning method. A practical method to implement a QAM constellation with L protection levels is to superpose L QAM constellation with different average powers, and the average powers may be optimized based on the existing error correction code.
For example, to construct an UEP constellation of 16 points X16QAM and two protection levels. X16QAM, the implementation method may superpose two QAM of 4 symbols (4-QAM): X16QAM=√{square root over (P1)}X4QAM
Figure US11456820-20220927-P00052
√{square root over (P2)}X4QAM, where
Figure US11456820-20220927-P00052
denotes constellation superposition and X4QAM is a 4-QAM of the average power P. The resulting constellation may look like the constellation in FIG. 6. The power ratio
P 1 P 2
is optimized based on the existing error correction code. A bit-level operator (e.g., an interleaver) may be employed between the FEC encoder 1702 and the constellation mapper 1706.
The above second embodiment discloses a practical method to construct UEP constellations for LDS using constellation superposition. The average power of each constellation involved in the superposition is optimized based on the existing error correction code.
In a third embodiment, the cloud partitioning method may be applied in the power domain NoMA. In the power domain NoMA, users are distinguished by the users' transmitting average powers. Under an average power constraint Pi for each user i, the implementation method may construct a UEP constellation for each user using the cloud partitioning method. As in the LDS scheme in the second embodiment, a practical method to implement a QAM constellation with L protection levels and average power Pi is to superpose L QAM constellations with different average power
Figure US11456820-20220927-P00066
, . . . ,
Figure US11456820-20220927-P00067
=1, . . . , L. Average powers
Figure US11456820-20220927-P00068
may be optimized based on the existing error correction code.
FIG. 18 shows a power-domain NoMA system 1800 with no spreading. For user 1802, FEC encoder 1804 generates coded bits 1806. Then, constellation mapper 1808 (with power P1) maps coded bits 1806 into constellation symbols 1810. For user 1812, FEC encoder 1814 generates coded bits 1816. Then, constellation mapper 1818 (with power P2) maps coded bits 1816 into constellation symbols 1820. A bit-level operator (e.g., an interleaver) could be employed between the FEC encoder and the constellation mapper.
The above third embodiment discloses a practical method to construct UEP constellations for PD-NoMA using constellation superposition. The average power of each constellation involved in the superposition is optimized based on the existing error correction code.
FIG. 19A illustrates a flowchart of method 1900 for data communications by a device in a communications system, according to some embodiments. Method 1900 may be carried out or performed by a transmitter of a communications device, such as the transmitter 200 in FIG. 2. Method 1900 may also be carried out or performed by routines, subroutines, or modules of software executed by one or more processors of the communications device. Coding of the software for carrying out or performing method 1900 is well within the scope of a person of ordinary skill in the art having regard to the present disclosure. The method may include additional or fewer operations than those shown and described and may be carried out or performed in a different order. Computer-readable code or instructions of the software executable by the one or more processor of the communications device may be stored on a non-transitory computer-readable medium, such as for example, memory of the communications device.
Method 1900 begins at operation 1902, where a bit-to-symbol mapper of the transmitter may obtain a forward error correction (FEC) encoded bit stream. The FEC encoded bit stream may be generated by an FEC encoder that encodes the payload data, such as FEC encoder 210. In one embodiment, the bit-to-symbol mapper may obtain the FEC encoded bit stream from an interleaver between the FEC encoder and the bit-to-symbol mapper. The FEC encoded bit stream may comprise a first FEC bit position associated with a first FEC error protection level and a second FEC bit position associated with a second FEC error protection level. The first FEC error protection level may be greater than the second FEC error protection level.
At operation 1904, the bit-to-symbol mapper may map the FEC encoded bit stream to produce a set of symbols according to a bit-to-symbol mapping rule. The bit-to-symbol mapping rule may comprise a first mapper bit position associated with a first mapper error protection level and a second mapper bit position associated with a second mapper error protection level. The first mapper error protection level may be greater than the second mapper error protection level. In one embodiment, the first FEC bit position may be mapped to the first mapper bit position, and the second FEC bit position may be mapped to the second mapper bit position. In another embodiment, the first FEC bit position may be mapped to the second mapper bit position, and the second FEC bit position may be mapped to the first mapper bit position.
In one embodiment, the FEC encoded bit stream may be a low-density parity-check (LDPC) encoded bit stream. The first FEC bit position may be associated with a first variable node of a LDPC code, and the second FEC bit position may be associated with a second variable node of the LDPC code. A degree of the first variable node may be higher than a degree of the second variable node. The LDPC encoded bit stream may be an interleaved LDPC encoded bit stream comprising a plurality of bits having the first FEC error protection level interleaved with a plurality of bits having the second FEC error protection level.
The first mapper error protection level may correspond to a first minimum distance, and the second mapper error protection level may correspond to a second minimum distance. The first minimum distance may be greater than the second minimum distance. The bit-to-symbol mapping rule may define a first subset of symbols separated by at least the first minimum distance from a second subset of symbols. The symbols in the first subset may be each separated by at least the second minimum distance, and the symbols in the second subset may be each separated by at least the second minimum distance.
In one embodiment, the bit-to-symbol mapping rule may be a one-dimensional constellation for mapping bits to complex-valued constellation points. The bit-to-symbol mapper may further spread the complex-valued constellation points to physical time and frequency resources. In another embodiment, the bit-to-symbol mapping rule may be a codebook for mapping and spreading bits to multi-dimensional codewords.
The bit-to-symbol mapping rule may be constructed by superposing a number of quadrature amplitude modulation (QAM) constellations with corresponding average powers associated with corresponding mapper error protection levels. The number of QAM constellations equal a number of the corresponding mapper error protection levels.
At operation 1906, the transmitter of the communications device may transmit the set of symbols in the communications system.
FIG. 19B illustrates a flowchart of method 1950 for data communications by a receiving device in a communications system, according to some embodiments. Method 1950 may be carried out or performed by a receiver of a communications device. Method 1950 may also be carried out or performed by routines, subroutines, or modules of software executed by one or more processors of the communications device. Coding of the software for carrying out or performing method 1950 is well within the scope of a person of ordinary skill in the art having regard to the present disclosure. The method may include additional or fewer operations than those shown and described and may be carried out or performed in a different order. Computer-readable code or instructions of the software executable by the one or more processor of the communications device may be stored on a non-transitory computer-readable medium, such as for example, memory of the communications device.
At operation 1952 of method 1950, the receiver of the communications device may receive a set of symbols from the communications system. The set of symbols may be mapped from a forward error correction (FEC) encoded bit stream according to a bit-to-symbol mapping rule. The bit-to-symbol mapping rule may comprise a first mapper bit position associated with a first mapper error protection level and a second mapper bit position associated with a second mapper error protection level. The FEC encoded bit stream may comprise a first FEC bit position associated with a first FEC error protection level and a second FEC bit position associated with a second FEC error protection level. The first FEC error protection level may be greater than the second FEC error protection level.
The above embodiments describe NoMA transmitter and receiver implementations based on designs of unequal error protection codebooks or constellations with flexible degrees of protection levels. The protection levels of the embodiment UEP codebooks or constellations can be optimized based on the existing error correction code and the system model parameters (e.g., the channel model, the number of users sharing same resources, etc.). This disclosure describes the above embodiments with respect to NoMA systems. Techniques described above may also apply to wireless communications systems in general, including orthogonal multiple access (OMA) systems and non-MA systems.
FIG. 20 illustrates a block diagram of an embodiment processing system 2000 for performing methods described herein. As shown, the processing system 2000 includes a processor 2004, a memory 2006, and interfaces 2010-2014. The processor 2004 may be any component or collection of components adapted to perform computations and/or other processing related tasks, and the memory 2006 may be any component or collection of components adapted to store programming and/or instructions for execution by the processor 2004. In an embodiment, the memory 2006 includes a non-transitory computer readable medium. The interfaces 2010, 2012, 2014 may be any component or collection of components that allow the processing system 2000 to communicate with other devices/components and/or a user. For example, one or more of the interfaces 2010, 2012, 2014 may be adapted to communicate data, control messages, or management messages from the processor 2004 to applications installed on a host device and/or a remote device. As another example, one or more of the interfaces 2010, 2012, 2014 may be adapted to allow a user-side device (e.g., personal computer (PC), etc.) to interact/communicate with the processing system 2000. The processing system 2000 may include additional components not depicted in FIG. 20, such as long term storage (e.g., non-volatile memory, etc.).
In some embodiments, the processing system 2000 is included in a network device that is accessing, or part otherwise of, a telecommunications network. In one example, the processing system 2000 is in a network-side device in a wireless or wireline telecommunications network, such as a base station, a relay station, a scheduler, a controller, a gateway, a router, an applications server, or any other device in the telecommunications network. In other embodiments, the processing system 2000 is in a user-side device accessing a wireless or wireline telecommunications network, such as a mobile station, a user equipment (UE), a personal computer (PC), a tablet, a wearable communications device (e.g., a smartwatch, etc.), or any other device adapted to access a telecommunications network.
In some embodiments, one or more of the interfaces 2010, 2012, 2014 connects the processing system 2000 to a transceiver adapted to transmit and receive signaling over the telecommunications network. FIG. 21 illustrates a block diagram of a transceiver 2100 adapted to transmit and receive signaling over a telecommunications network. The transceiver 2100 may be installed in a host device. As shown, the transceiver 2100 comprises a network-side interface 2102, a coupler 2104, a transmitter 2106 (which may be implemented using all or some components of the transmitter 200 in FIG. 2), a receiver 2108, a signal processor 2110, and a device-side interface 2112. The network-side interface 2102 may include any component or collection of components adapted to transmit or receive signaling over a wireless or wireline telecommunications network. The network-side interface 2102 may also include any component or collection of components adapted to transmit or receive signaling over a short-range interface. The network-side interface 2102 may also include any component or collection of components adapted to transmit or receive signaling over a Uu interface. The coupler 2104 may include any component or collection of components adapted to facilitate bi-directional communications over the network-side interface 2102. The transmitter 2106 may include any component or collection of components (e.g., up-converter, power amplifier, etc.) adapted to convert a baseband signal into a modulated carrier signal suitable for transmission over the network-side interface 2102. A means for transmitting an initial message of an access procedure may include transmitter 2106. The receiver 2108 may include any component or collection of components (e.g., down-converter, low noise amplifier, etc.) adapted to convert a carrier signal received over the network-side interface 2102 into a baseband signal. A means for receiving mobile subscriber identifiers, initial downlink messages of access procedures, and forwarded requests to connect to a network may include receiver 2108.
The signal processor 2110 may include any component or collection of components adapted to convert a baseband signal into a data signal suitable for communications over the device-side interface(s) 2112, or vice-versa. The device-side interface(s) 2112 may include any component or collection of components adapted to communicate data-signals between the signal processor 2110 and components within the host device (e.g., the processing system 2000, local area network (LAN) ports, etc.).
The transceiver 2100 may transmit and receive signaling over any type of communications medium. In some embodiments, the transceiver 2100 transmits and receives signaling over a wireless medium. For example, the transceiver 2100 may be a wireless transceiver adapted to communicate in accordance with a wireless telecommunications protocol, such as a cellular protocol (e.g., long-term evolution (LTE), etc.), a wireless local area network (WLAN) protocol (e.g., Wi-Fi, etc.), or any other type of wireless protocol (e.g., Bluetooth, near field communications (NFC), etc.).
In such embodiments, the network-side interface 2102 comprises one or more antenna/radiating elements. For example, the network-side interface 2102 may include a single antenna, multiple separate antennas, or a multi-antenna array configured for multi-layer communications, e.g., single input multiple output (SIMO), multiple input single output (MISO), multiple input multiple output (MIMO), etc. In other embodiments, the transceiver 2100 transmits and receives signaling over a wireline medium, e.g., twisted-pair cable, coaxial cable, optical fiber, etc. Specific processing systems and/or transceivers may utilize all of the components shown, or only a subset of the components, and levels of integration may vary from device to device.
Although this invention has been described with reference to illustrative embodiments, this description is not intended to be construed in a limiting sense. Various modifications and combinations of the illustrative embodiments, as well as other embodiments of the invention, will be apparent to persons skilled in the art upon reference to the description. It is therefore intended that the appended claims encompass any such modifications or embodiments.

Claims (19)

What is claimed is:
1. A method comprising:
obtaining, by a device, a forward error correction (FEC) encoded bit stream;
mapping, by the device, the FEC encoded bit stream to a set of symbols according to a bit-to-symbol mapping rule, wherein the bit-to-symbol mapping rule comprises a first mapper bit position associated with a first mapper error protection level and a second mapper bit position associated with a second mapper error protection level, wherein the first mapper error protection level is greater than the second mapper error protection level, wherein the first mapper error protection level corresponds to a first minimum distance, and wherein the second mapper error protection level corresponds to a second minimum distance, the first minimum distance being greater than the second minimum distance; and
transmitting, by the device, the set of symbols.
2. The method of claim 1, wherein the FEC encoded bit stream comprises a first FEC bit position associated with a first FEC error protection level and a second FEC bit position associated with a second FEC error protection level, wherein the first FEC error protection level is greater than the second FEC error protection level.
3. The method of claim 2, wherein the first FEC bit position is mapped to the first mapper bit position, and the second FEC bit position is mapped to the second mapper bit position.
4. The method of claim 2, wherein the first FEC bit position is mapped to the second mapper bit position, and the second FEC bit position is mapped to the first mapper bit position.
5. The method of claim 2, wherein the FEC encoded bit stream is a low-density parity-check (LDPC) encoded bit stream, the first FEC bit position is associated with a first variable node of a LDPC code, the second FEC bit position is associated with a second variable node of the LDPC code, and a first degree of the first variable node is higher than a second degree of the second variable node.
6. The method of claim 5, wherein the LDPC encoded bit stream is an interleaved LDPC encoded bit stream comprising a first plurality of bits having the first FEC error protection level interleaved with a second plurality of bits having the second FEC error protection level.
7. The method of claim 1, wherein the bit-to-symbol mapping rule defines a first subset of symbols separated by at least the first minimum distance from a second subset of symbols, and wherein the symbols in the first subset are each separated by at least the second minimum distance and the symbols in the second subset are each separated by at least the second minimum distance.
8. The method of claim 1, wherein the bit-to-symbol mapping rule is a one-dimensional constellation for mapping bits to complex-valued constellation points.
9. The method of claim 8, further comprising spreading the complex-valued constellation points to physical time and frequency resources.
10. The method of claim 1, wherein the bit-to-symbol mapping rule is a codebook for mapping and spreading bits to multi-dimensional codewords.
11. The method of claim 1, wherein the bit-to-symbol mapping rule is constructed by superposing a number of quadrature amplitude modulation (QAM) constellations with corresponding average powers associated with corresponding mapper error protection levels, and the number of QAM constellations equal a number of the corresponding mapper error protection levels.
12. A transmitting device comprising:
a bit-to-symbol mapper configured to:
obtain a forward error correction (FEC) encoded bit stream; and
map the FEC encoded bit stream to a set of symbols according to a bit-to-symbol mapping rule, wherein the bit-to-symbol mapping rule comprises a first mapper bit position associated with a first mapper error protection level and a second mapper bit position associated with a second mapper error protection level, wherein the first mapper error protection level is greater than the second mapper error protection level, wherein the first mapper error protection level corresponds to a first minimum distance, and wherein the second mapper error protection level corresponds to a second minimum distance, the first minimum distance being greater than the second minimum distance; and
a transmitter configured to:
transmit the set of symbols.
13. The transmitting device of claim 12, wherein the FEC encoded bit stream comprises a first FEC bit position associated with a first FEC error protection level and a second FEC bit position associated with a second FEC error protection level, wherein the first FEC error protection level is greater than the second FEC error protection level.
14. The transmitting device of claim 13, wherein the first FEC bit position is mapped to the first mapper bit position, and the second FEC bit position is mapped to the second mapper bit position.
15. The transmitting device of claim 13, wherein the first FEC bit position is mapped to the second mapper bit position, and the second FEC bit position is mapped to the first mapper bit position.
16. The transmitting device of claim 13, wherein the FEC encoded bit stream is a low-density parity-check (LDPC) encoded bit stream, the first FEC bit position is associated with a first variable node of a LDPC code, the second FEC bit position is associated with a second variable node of the LDPC code, and a first degree of the first variable node is higher than a second degree of the second variable node.
17. The transmitting device of claim 16, wherein the LDPC encoded bit stream is an interleaved LDPC encoded bit stream comprising a first plurality of bits having the first FEC error protection level interleaved with a second plurality of bits having the second FEC error protection level.
18. A device comprising:
at least one processor;
a non-transitory memory storing instructions that are executable by the at least one processor to cause the device to:
obtain a forward error correction (FEC) encoded bit stream;
map the FEC encoded bit stream to a set of symbols according to a bit-to-symbol mapping rule, wherein the bit-to-symbol mapping rule comprises a first mapper bit position associated with a first mapper error protection level and a second mapper bit position associated with a second mapper error protection level, wherein the first mapper error protection level is greater than the second mapper error protection level, wherein the first mapper error protection level corresponds to a first minimum distance, and wherein the second mapper error protection level corresponds to a second minimum distance, the first minimum distance being greater than the second minimum distance; and
transmit the set of symbols.
19. The device of claim 18, wherein the FEC encoded bit stream comprises a first FEC bit position associated with a first FEC error protection level and a second FEC bit position associated with a second FEC error protection level, wherein the first FEC error protection level is greater than the second FEC error protection level.
US17/089,101 2018-07-05 2020-11-04 Method and apparatus for wireless communications with unequal error protection Active 2038-07-26 US11456820B2 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/094693 WO2020006738A1 (en) 2018-07-05 2018-07-05 Method and apparatus for wireless communications with unequal error protection

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/094693 Continuation WO2020006738A1 (en) 2018-07-05 2018-07-05 Method and apparatus for wireless communications with unequal error protection

Publications (2)

Publication Number Publication Date
US20210119734A1 US20210119734A1 (en) 2021-04-22
US11456820B2 true US11456820B2 (en) 2022-09-27

Family

ID=69059991

Family Applications (1)

Application Number Title Priority Date Filing Date
US17/089,101 Active 2038-07-26 US11456820B2 (en) 2018-07-05 2020-11-04 Method and apparatus for wireless communications with unequal error protection

Country Status (2)

Country Link
US (1) US11456820B2 (en)
WO (1) WO2020006738A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116848826A (en) * 2021-02-27 2023-10-03 华为技术有限公司 Codeword mapping method and device
CN113419214B (en) * 2021-06-22 2022-08-30 桂林电子科技大学 Indoor positioning method for target without carrying equipment
KR20230019636A (en) * 2021-08-02 2023-02-09 삼성전자주식회사 Method and apparatus for decoding of data in communication and broadcasting systems
WO2023108559A1 (en) * 2021-12-16 2023-06-22 Huawei Technologies Co.,Ltd. Method and system for physical layer joint error correction coding of multiple payloads
US11736320B2 (en) * 2022-02-14 2023-08-22 Ultralogic 6G, Llc Multiplexed amplitude-phase modulation for 5G/6G noise mitigation
US11770209B2 (en) 2022-09-06 2023-09-26 Ultralogic 6G, Llc Signal quality input for error-detection codes in 5G and 6G
US11799585B2 (en) 2022-09-06 2023-10-24 David E. Newman Error correction in 5G and 6G using AI-based analog-digital correlations

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030039318A1 (en) * 2001-08-23 2003-02-27 Wen Tong System and method performing quadrature amplitude modulation by combining co-sets and strongly coded co-set identifiers
WO2003107539A1 (en) 2002-06-18 2003-12-24 Nokia Corporation Method and apparatus for puncturing with unequal error protection in a wireless communication system
US6831574B1 (en) 2003-10-03 2004-12-14 Bae Systems Information And Electronic Systems Integration Inc Multi-turbo multi-user detector
US20070127587A1 (en) 2005-12-01 2007-06-07 Samsung Electronics Co., Ltd. Interleaver design for IEEE 802.11n standard
US20070204205A1 (en) * 2006-02-15 2007-08-30 Samsung Electronics Co., Ltd. Method and system for application of unequal error protection to uncompressed video for transmission over wireless channels
US20080239936A1 (en) 2007-03-28 2008-10-02 Motorola, Inc. Method and apparatus for mitigating interference in multicarrier modulation systems
US20140270000A1 (en) * 2013-03-14 2014-09-18 Research In Motion Limited Computation of Reliability Values
US20160197752A1 (en) * 2013-08-22 2016-07-07 Alcatel Lucent Non-deterministic pilot symbol scheme
US20180083716A1 (en) * 2016-09-19 2018-03-22 Alcatel-Lucent Usa Inc. Probabilistic signal shaping and codes therefor
US10110346B1 (en) * 2016-04-14 2018-10-23 Mbit Wireless, Inc. Method and apparatus for soft bit computation in MIMO decoders
US20190007092A1 (en) * 2016-04-12 2019-01-03 Huawei Technologies Co., Ltd. Methods and Apparatus for Signal Spreading and Multiplexing

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030039318A1 (en) * 2001-08-23 2003-02-27 Wen Tong System and method performing quadrature amplitude modulation by combining co-sets and strongly coded co-set identifiers
WO2003107539A1 (en) 2002-06-18 2003-12-24 Nokia Corporation Method and apparatus for puncturing with unequal error protection in a wireless communication system
US6831574B1 (en) 2003-10-03 2004-12-14 Bae Systems Information And Electronic Systems Integration Inc Multi-turbo multi-user detector
US20070127587A1 (en) 2005-12-01 2007-06-07 Samsung Electronics Co., Ltd. Interleaver design for IEEE 802.11n standard
CN101385357A (en) 2006-02-15 2009-03-11 三星电子株式会社 Method and system for application of unequal error protection to uncompressed video for transmission over wireless channels
US20070204205A1 (en) * 2006-02-15 2007-08-30 Samsung Electronics Co., Ltd. Method and system for application of unequal error protection to uncompressed video for transmission over wireless channels
US20080239936A1 (en) 2007-03-28 2008-10-02 Motorola, Inc. Method and apparatus for mitigating interference in multicarrier modulation systems
CN101658006A (en) 2007-03-28 2010-02-24 摩托罗拉公司 Method and apparatus for mitigating interference in multicarrier modulation systems
US20140270000A1 (en) * 2013-03-14 2014-09-18 Research In Motion Limited Computation of Reliability Values
US20160197752A1 (en) * 2013-08-22 2016-07-07 Alcatel Lucent Non-deterministic pilot symbol scheme
US20190007092A1 (en) * 2016-04-12 2019-01-03 Huawei Technologies Co., Ltd. Methods and Apparatus for Signal Spreading and Multiplexing
US10110346B1 (en) * 2016-04-14 2018-10-23 Mbit Wireless, Inc. Method and apparatus for soft bit computation in MIMO decoders
US20180083716A1 (en) * 2016-09-19 2018-03-22 Alcatel-Lucent Usa Inc. Probabilistic signal shaping and codes therefor

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Chen et al. "Dual Diversity Space-Time Coding for Multimedia Broadcast/Multicast Service in MIMO Systems," in IEEE Transactions on Communications, vol. 60, No. 11, pp. 3286-3297, Nov. 2012. (Year: 2012). *

Also Published As

Publication number Publication date
US20210119734A1 (en) 2021-04-22
WO2020006738A1 (en) 2020-01-09

Similar Documents

Publication Publication Date Title
US10700912B2 (en) Method and system for non-orthogonal multiple access communication
US11456820B2 (en) Method and apparatus for wireless communications with unequal error protection
CN112005502B (en) Method and system for non-orthogonal multiple access communication
US11336328B2 (en) Method and apparatus for non-orthogonal multiple access communication
EP3172853B1 (en) System and method for generating codebooks with small projections per complex dimension and utilization thereof
Taherzadeh et al. SCMA codebook design
US11206113B2 (en) Systems and methods for NOMA (non-orthogonal multiple access) transmitter with legacy modulators
Wang et al. Spectral efficiency improvement with 5G technologies: Results from field tests
WO2019101117A1 (en) Method and system for symbol sequence generation and transmission for non-orthogonal multiple access transmission
KR101926005B1 (en) System and method for scalable digital communications with adaptive system parameters
Pan et al. Practical power-balanced non-orthogonal multiple access
WO2018014272A1 (en) Methods and systems for encoding and decoding for ldpc codes
KR20190050822A (en) Methods for Multiple Access Transmission
WO2020094048A1 (en) Segment based reference signal
US11569938B2 (en) Method and apparatus for transmitting and receiving signal using multiple antennas
KR102369775B1 (en) Method and apparatus for transmitting and receiving signal using multiple antenna
Zhang et al. A Novel SCMA Codebook Design Method Based on Low Error Probability Criteria
KR20230119517A (en) Method and apparatus for transmitting and receiving data based on phase rotation interleaving in communication system

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

AS Assignment

Owner name: HUAWEI TECHNOLOGIES CO., LTD., CHINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MHEICH, ZEINA;WEN, LEI;XIAO, PEI;AND OTHERS;SIGNING DATES FROM 20201103 TO 20220311;REEL/FRAME:059240/0597

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE